Mike Rosulek

From MaRDI portal
Person:775979

Available identifiers

zbMath Open rosulek.mikeMaRDI QIDQ775979

List of research outcomes





PublicationDate of PublicationType
Malicious secure, structure-aware private set intersection2024-02-02Paper
How to obfuscate MPC inputs2023-08-14Paper
Finding one common item, privately2023-07-25Paper
Structure-aware private set intersection, with applications to fuzzy matching2023-06-12Paper
Batching base oblivious transfers2023-05-12Paper
Oblivious key-value stores and amplification for private set intersection2022-04-22Paper
Three halves make a whole? Beating the half-gates lower bound for garbled circuits2022-03-31Paper
PSI from PaXoS: fast, malicious private set intersection2022-03-23Paper
Private set operations from oblivious switching2021-12-21Paper
SWiM: secure wildcard pattern matching from OT extension2021-03-17Paper
Optimizing authenticated garbling for faster secure two-party computation2020-06-30Paper
Scalable private set union from symmetric-key techniques2020-05-05Paper
Characterizing collision and second-preimage resistance in Linicrypt2020-04-30Paper
SpOT-light: lightweight private set intersection from sparse OT extension2020-03-09Paper
On the structure of unconditional UC hybrid protocols2018-12-06Paper
Improvements for gate-hiding garbled circuits2018-04-26Paper
Reconciling non-malleability with homomorphic encryption2017-10-12Paper
Non-interactive secure 2PC in the offline/online and batch settings2017-06-23Paper
Improved private set intersection against malicious adversaries2017-06-13Paper
Sublinear zero-knowledge arguments for RAM programs2017-06-13Paper
Linicrypt: a model for practical cryptography2016-11-09Paper
Efficient zero-knowledge proofs of non-algebraic statements with sublinear amortized cost2015-12-10Paper
How to efficiently evaluate RAM programs with malicious security2015-09-30Paper
Richer Efficiency/Security Trade-offs in 2PC2015-07-06Paper
A unified characterization of completeness and triviality for secure function evaluation2014-08-20Paper
Flexor: Flexible garbling for XOR gates that beats free-XOR2014-08-07Paper
Multi-party computation of polynomials and branching programs without simultaneous interaction2013-05-31Paper
Characterizing the Cryptographic Properties of Reactive 2-Party Functionalities2013-03-18Paper
Universal composability from essentially any trusted setup2012-09-25Paper
Must you know the code of \(f\) to securely compute \(f\)?2012-09-25Paper
Exploring the limits of common coins using frontier analysis of protocols2011-05-19Paper
Attribute-based signatures2011-02-11Paper
A zero-one law for cryptographic complexity with respect to computational UC security2010-08-24Paper
Rerandomizable RCCA Encryption2009-03-10Paper
Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation2009-03-03Paper
Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations2009-02-10Paper
Towards Robust Computation on Encrypted Data2009-02-10Paper
Homomorphic Encryption with CCA Security2008-08-19Paper

Research outcomes over time

This page was built for person: Mike Rosulek