| Publication | Date of Publication | Type |
|---|
| Willow: secure aggregation with one-shot clients | 2026-02-06 | Paper |
| PanORAMa: oblivious RAM with logarithmic overhead | 2025-08-12 | Paper |
| Hintless single-server private information retrieval | 2024-12-13 | Paper |
| Anonymous counting tokens | 2024-06-26 | Paper |
Private join and compute from PIR with default Lecture Notes in Computer Science | 2023-05-12 | Paper |
| Two-sided malicious security for private intersection-sum with cardinality | 2022-12-07 | Paper |
| Anonymous tokens with private metadata bit | 2022-11-09 | Paper |
On the (in)security of ROS Journal of Cryptology | 2022-09-23 | Paper |
On the (in)security of ROS Lecture Notes in Computer Science | 2021-12-08 | Paper |
| A simple obfuscation scheme for pattern-matching with wildcards | 2020-06-30 | Paper |
| Public-key function-private hidden vector encryption (and more) | 2020-05-11 | Paper |
| Obfuscation from polynomial hardness: beyond decomposable obfuscation | 2018-10-17 | Paper |
| Optimal-rate non-committing encryption | 2018-02-23 | Paper |
Multi-input inner-product functional encryption from pairings Lecture Notes in Computer Science | 2017-06-13 | Paper |
Low-leakage secure search for Boolean expressions Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
Adaptive succinct garbled RAM or: how to delegate your database Theory of Cryptography | 2016-12-22 | Paper |
Candidate indistinguishability obfuscation and functional encryption for all circuits SIAM Journal on Computing | 2016-07-04 | Paper |
Private database access with HE-over-ORAM architecture Applied Cryptography and Network Security | 2016-03-10 | Paper |
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations Lecture Notes in Computer Science | 2015-12-10 | Paper |
Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation Advances in Cryptology - EUROCRYPT 2015 | 2015-09-30 | Paper |
Optimizing ORAM and Using It Efficiently for Secure Computation Privacy Enhancing Technologies | 2014-08-19 | Paper |
Garbled RAM revisited Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
Two-round secure MPC from indistinguishability obfuscation Theory of Cryptography | 2014-02-18 | Paper |
Adaptive and concurrent secure computation from new adaptive, non-malleable commitments Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Quadratic span programs and succinct NIZKs without PCPs Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings | 2013-05-31 | Paper |
Efficient robust private set intersection International Journal of Applied Cryptography | 2012-11-16 | Paper |
How to delegate and verify in public: verifiable computation from attribute-based encryption Theory of Cryptography | 2012-06-15 | Paper |
Permutation reconstruction from minors The Electronic Journal of Combinatorics | 2006-08-30 | Paper |
Permutation reconstruction from minors The Electronic Journal of Combinatorics | 2006-08-30 | Paper |