Kevin Lewi

According to our database1, Kevin Lewi authored at least 28 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
WhisPIR: Stateless Private Information Retrieval with Low Communication.
IACR Cryptol. ePrint Arch., 2024

2023
Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging.
IACR Cryptol. ePrint Arch., 2023

STROBE: Streaming Threshold Random Beacons.
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023

2022
Oblivious Revocable Functions and Encrypted Indexing.
IACR Cryptol. ePrint Arch., 2022

Aggregating and Thresholdizing Hash-based Signatures using STARKs.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
HashWires: Hyperefficient Credential-Based Range Proofs.
Proc. Priv. Enhancing Technol., 2021

Aggregating hash-based signatures using STARKs.
IACR Cryptol. ePrint Arch., 2021

STROBE: Stake-based Threshold Random Beacons.
IACR Cryptol. ePrint Arch., 2021

2020
Single-Message Credential-Hiding Login.
IACR Cryptol. ePrint Arch., 2020

Distributed Auditing Proofs of Liabilities.
IACR Cryptol. ePrint Arch., 2020

2019
Securing Update Propagation with Homomorphic Hashing.
IACR Cryptol. ePrint Arch., 2019

2018
Scaling Backend Authentication at Facebook.
IACR Cryptol. ePrint Arch., 2018

2016
Advanced applications of multilinear maps in cryptography.
PhD thesis, 2016

Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds.
IACR Cryptol. ePrint Arch., 2016

5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs.
IACR Cryptol. ePrint Arch., 2016

Function-Hiding Inner Product Encryption is Practical.
IACR Cryptol. ePrint Arch., 2016

2015
Preventing Unraveling in Social Networks: The Anchored k-Core Problem.
SIAM J. Discret. Math., 2015

Practical Order-Revealing Encryption with Limited Leakage.
IACR Cryptol. ePrint Arch., 2015

Constraining Pseudorandom Functions Privately.
IACR Cryptol. ePrint Arch., 2015

Key Homomorphic PRFs and Their Applications.
IACR Cryptol. ePrint Arch., 2015

2014
Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation.
IACR Cryptol. ePrint Arch., 2014

Losing Weight by Gaining Edges.
Proceedings of the Algorithms - ESA 2014, 2014

Improved Constructions of PRFs Secure Against Related-Key Attacks.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
On the parameterized complexity of k-SUM.
CoRR, 2013

Exact Weight Subgraphs and the k-Sum Conjecture.
Proceedings of the Automata, Languages, and Programming - 40th International Colloquium, 2013

2012
Iterating Inverse Binary Transducers.
J. Autom. Lang. Comb., 2012

The Online Metric Matching Problem for Doubling Metrics.
Proceedings of the Automata, Languages, and Programming - 39th International Colloquium, 2012

Iterating Invertible Binary Transducers.
Proceedings of the Descriptional Complexity of Formal Systems, 2012


  Loading...