59 results on '"Rosulek A"'
Search Results
2. Malicious Secure, Structure-Aware Private Set Intersection.
3. Verifiable Distributed Aggregation Functions.
4. Practical Privacy-Preserving Authentication for SSH.
5. Structure-Aware Private Set Intersection, With Applications to Fuzzy Matching.
6. Finding One Common Item, Privately.
7. A Complete Characterization of Security for Linicrypt Block Cipher Modes.
8. How to Obfuscate MPC Inputs.
9. Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits.
10. Compact and Malicious Private Set Intersection for Small Sets.
11. Oblivious Key-Value Stores and Amplification for Private Set Intersection.
12. Private Set Operations from Oblivious Switching.
13. Batching Base Oblivious Transfers.
14. Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public Functions.
15. PSI from PaXoS: Fast, Malicious Private Set Intersection.
16. Fast Database Joins for Secret Shared Data.
17. SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension.
18. Cheaper Private Set Intersection via Differentially Private Leakage.
19. Practical Privacy-Preserving K-means Clustering.
20. Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption.
21. Scalable Private Set Union from Symmetric-Key Techniques.
22. Garbled Neural Networks are Practical.
23. TACHYON: Fast Signatures from Compact Knapsack.
24. Characterizing Collision and Second-Preimage Resistance in Linicrypt.
25. Optimizing Authenticated Garbling for Faster Secure Two-Party Computation.
26. PIR-PSI: Scaling Private Contact Discovery.
27. Improvements for Gate-Hiding Garbled Circuits.
28. SWiM: Secure Wildcard Pattern Matching From OT Extension.
29. Practical Multi-party Private Set Intersection from Symmetric-Key Techniques.
30. Non-Interactive Secure 2PC in the Offline/Online and Batch Settings.
31. Sublinear Zero-Knowledge Arguments for RAM Programs.
32. Approximate Thumbnail Preserving Encryption.
33. Efficient Maliciously Secure Two Party Computation for Mixed Programs.
34. Malicious-Secure Private Set Intersection via Dual Execution.
35. DUPLO: Unifying Cut-and-Choose for Garbled Circuits.
36. On the Structure of Unconditional UC Hybrid Protocols.
37. Faster Malicious 2-party Secure Computation with Online/Ofine Dual Execution.
38. Linicrypt: A Model for Practical Cryptography.
39. Efficient Batched Oblivious PRF with Applications to Private Set Intersection.
40. Garbling Gadgets for Boolean and Arithmetic Circuits.
41. Improved Private Set Intersection against Malicious Adversaries.
42. Secure Data Exchange: A Marketplace in the Cloud.
43. Richer Efficiency/Security Trade-offs in 2PC.
44. Fast and Secure Three-party Computation: The Garbled Circuit Approach.
45. Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost.
46. Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates.
47. How to Efficiently Evaluate RAM Programs with Malicious Security.
48. FleXOR: Flexible garbling for XOR gates that beats free-XOR.
49. Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction.
50. Complexity of Multi-Party Computation Functionalities.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.