466 results on '"Rosulek A"'
Search Results
2. Malicious Secure, Structure-Aware Private Set Intersection.
3. Malicious Secure, Structure-Aware Private Set Intersection
4. Verifiable Distributed Aggregation Functions.
5. Malicious Secure, Structure-Aware Private Set Intersection
6. Fuzzy PSI via Oblivious Protocol Routing.
7. Finding One Common Item, Privately.
8. Practical Privacy-Preserving Authentication for SSH.
9. How to Obfuscate MPC Inputs.
10. Structure-Aware Private Set Intersection, with Applications to Fuzzy Matching.
11. A Complete Characterization of Security for Linicrypt Block Cipher Modes.
12. How to Obfuscate MPC Inputs
13. Structure-Aware Private Set Intersection, with Applications to Fuzzy Matching
14. Finding One Common Item, Privately
15. Batching Base Oblivious Transfers.
16. Private Set Operations from Oblivious Switching.
17. Compact and Malicious Private Set Intersection for Small Sets.
18. Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits.
19. Oblivious Key-Value Stores and Amplification for Private Set Intersection.
20. Batching Base Oblivious Transfers
21. Oblivious Key-Value Stores and Amplification for Private Set Intersection
22. Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits
23. Private Set Operations from Oblivious Switching
24. Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public Functions.
25. Fast Database Joins and PSI for Secret Shared Data.
26. PSI from PaXoS: Fast, Malicious Private Set Intersection.
27. PSI from PaXoS: Fast, Malicious Private Set Intersection
28. How to Obfuscate MPC Inputs
29. Structure-Aware Private Set Intersection, with Applications to Fuzzy Matching
30. Motif orientation matters: Structural characterization of TEAD1 recognition of genomic DNA
31. On the (Im)Practicality of Adversarial Perturbation for Image Privacy.
32. Scalable Private Set Union from Symmetric-Key Techniques.
33. Characterizing Collision and Second-Preimage Resistance in Linicrypt.
34. Secure Data Exchange: A Marketplace in the Cloud.
35. SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension.
36. Characterizing Collision and Second-Preimage Resistance in Linicrypt
37. Scalable Private Set Union from Symmetric-Key Techniques
38. SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension
39. Practical Privacy-Preserving K-means Clustering.
40. SWiM: Secure Wildcard Pattern Matching from OT Extension.
41. On the Structure of Unconditional UC Hybrid Protocols.
42. TACHYON: Fast Signatures from Compact Knapsack.
43. Optimizing Authenticated Garbling for Faster Secure Two-Party Computation.
44. SWiM: Secure Wildcard Pattern Matching from OT Extension
45. Optimizing Authenticated Garbling for Faster Secure Two-Party Computation
46. On the Structure of Unconditional UC Hybrid Protocols
47. Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits
48. Oblivious Key-Value Stores and Amplification for Private Set Intersection
49. Private Set Operations from Oblivious Switching
50. The C-type lectin-like receptor Nkrp1b: Structural proteomics reveals features affecting protein conformation and interactions
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.