2024
WhisPIR: Stateless Private Information Retrieval with Low Communication.
IACR Cryptol. ePrint Arch., 2024
2023
Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging.
IACR Cryptol. ePrint Arch., 2023
STROBE: Streaming Threshold Random Beacons.
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023
2022
Oblivious Revocable Functions and Encrypted Indexing.
IACR Cryptol. ePrint Arch., 2022
Aggregating and Thresholdizing Hash-based Signatures using STARKs.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
HashWires: Hyperefficient Credential-Based Range Proofs.
Proc. Priv. Enhancing Technol., 2021
Aggregating hash-based signatures using STARKs.
IACR Cryptol. ePrint Arch., 2021
STROBE: Stake-based Threshold Random Beacons.
IACR Cryptol. ePrint Arch., 2021
2020
Single-Message Credential-Hiding Login.
IACR Cryptol. ePrint Arch., 2020
Distributed Auditing Proofs of Liabilities.
IACR Cryptol. ePrint Arch., 2020
2019
Securing Update Propagation with Homomorphic Hashing.
IACR Cryptol. ePrint Arch., 2019
2018
Scaling Backend Authentication at Facebook.
IACR Cryptol. ePrint Arch., 2018
2016
Advanced applications of multilinear maps in cryptography.
PhD thesis, 2016
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds.
IACR Cryptol. ePrint Arch., 2016
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs.
IACR Cryptol. ePrint Arch., 2016
Function-Hiding Inner Product Encryption is Practical.
IACR Cryptol. ePrint Arch., 2016
2015
Preventing Unraveling in Social Networks: The Anchored k-Core Problem.
SIAM J. Discret. Math., 2015
Practical Order-Revealing Encryption with Limited Leakage.
IACR Cryptol. ePrint Arch., 2015
Constraining Pseudorandom Functions Privately.
IACR Cryptol. ePrint Arch., 2015
Key Homomorphic PRFs and Their Applications.
IACR Cryptol. ePrint Arch., 2015
2014
Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation.
IACR Cryptol. ePrint Arch., 2014
Losing Weight by Gaining Edges.
Proceedings of the Algorithms - ESA 2014, 2014
Improved Constructions of PRFs Secure Against Related-Key Attacks.
Proceedings of the Applied Cryptography and Network Security, 2014
2013
On the parameterized complexity of k-SUM.
CoRR, 2013
Exact Weight Subgraphs and the k-Sum Conjecture.
Proceedings of the Automata, Languages, and Programming - 40th International Colloquium, 2013
2012
Iterating Inverse Binary Transducers.
J. Autom. Lang. Comb., 2012
The Online Metric Matching Problem for Doubling Metrics.
Proceedings of the Automata, Languages, and Programming - 39th International Colloquium, 2012
Iterating Invertible Binary Transducers.
Proceedings of the Descriptional Complexity of Formal Systems, 2012