BibTeX records: Oxana Poburinnaya

download as .bib file

@inproceedings{DBLP:conf/crypto/AcharyaHPV23,
  author       = {Anasuya Acharya and
                  Carmit Hazay and
                  Oxana Poburinnaya and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Best of Both Worlds - Revisiting the Spymasters Double Agent Problem},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {328--359},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_11},
  doi          = {10.1007/978-3-031-38557-5\_11},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AcharyaHPV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AcharyaHPV23,
  author       = {Anasuya Acharya and
                  Carmit Hazay and
                  Oxana Poburinnaya and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Best of Both Worlds: Revisiting the Spymasters Double Agent Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1013},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1013},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AcharyaHPV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/CanettiPV22,
  author       = {Ran Canetti and
                  Oxana Poburinnaya and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation
                  in the Plain Model},
  journal      = {{SIAM} J. Comput.},
  volume       = {51},
  number       = {2},
  pages        = {17--333},
  year         = {2022},
  url          = {https://doi.org/10.1137/17m1151602},
  doi          = {10.1137/17M1151602},
  timestamp    = {Mon, 27 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/CanettiPV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BangaloreOPV22,
  author       = {Laasya Bangalore and
                  Rafail Ostrovsky and
                  Oxana Poburinnaya and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Adaptively Secure Computation for {RAM} Programs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13276},
  pages        = {187--216},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07085-3\_7},
  doi          = {10.1007/978-3-031-07085-3\_7},
  timestamp    = {Tue, 31 May 2022 17:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BangaloreOPV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CanettiCKKPP22,
  author       = {Ran Canetti and
                  Suvradip Chakraborty and
                  Dakshita Khurana and
                  Nishant Kumar and
                  Oxana Poburinnaya and
                  Manoj Prabhakaran},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {COA-Secure Obfuscation and Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13275},
  pages        = {731--758},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06944-4\_25},
  doi          = {10.1007/978-3-031-06944-4\_25},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CanettiCKKPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiCKKPP22,
  author       = {Ran Canetti and
                  Suvradip Chakraborty and
                  Dakshita Khurana and
                  Nishant Kumar and
                  Oxana Poburinnaya and
                  Manoj Prabhakaran},
  title        = {COA-Secure Obfuscation and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1781},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1781},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiCKKPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChaseGP20,
  author       = {Melissa Chase and
                  Esha Ghosh and
                  Oxana Poburinnaya},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Secret-Shared Shuffle},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12493},
  pages        = {342--372},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64840-4\_12},
  doi          = {10.1007/978-3-030-64840-4\_12},
  timestamp    = {Thu, 10 Dec 2020 10:11:44 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChaseGP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CanettiPP20,
  author       = {Ran Canetti and
                  Sunoo Park and
                  Oxana Poburinnaya},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Fully Deniable Interactive Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {807--835},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_27},
  doi          = {10.1007/978-3-030-56784-2\_27},
  timestamp    = {Wed, 12 Aug 2020 14:16:56 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CanettiPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CanettiP20,
  author       = {Ran Canetti and
                  Oxana Poburinnaya},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Towards Multiparty Computation Withstanding Coercion of All Parties},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12551},
  pages        = {410--438},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64378-2\_15},
  doi          = {10.1007/978-3-030-64378-2\_15},
  timestamp    = {Tue, 15 Dec 2020 12:01:12 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/CanettiP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/0030CDPRR20,
  author       = {Hao Chen and
                  Ilaria Chillotti and
                  Yihe Dong and
                  Oxana Poburinnaya and
                  Ilya P. Razenshteyn and
                  M. Sadegh Riazi},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {{SANNS:} Scaling Up Secure Approximate k-Nearest Neighbors Search},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {2111--2128},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/chen-hao},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/0030CDPRR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiP20,
  author       = {Ran Canetti and
                  Oxana Poburinnaya},
  title        = {Towards Multiparty Computation Withstanding Coercion of All Parties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1434},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1434},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Poburinnaya19,
  author       = {Oxana Poburinnaya},
  title        = {Studies in incoercible and adaptively secure computation},
  school       = {Boston University, {USA}},
  year         = {2019},
  url          = {https://hdl.handle.net/2144/41669},
  timestamp    = {Fri, 13 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Poburinnaya19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-02033,
  author       = {Hao Chen and
                  Ilaria Chillotti and
                  Yihe Dong and
                  Oxana Poburinnaya and
                  Ilya P. Razenshteyn and
                  M. Sadegh Riazi},
  title        = {{SANNS:} Scaling Up Secure Approximate k-Nearest Neighbors Search},
  journal      = {CoRR},
  volume       = {abs/1904.02033},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.02033},
  eprinttype    = {arXiv},
  eprint       = {1904.02033},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-02033.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenCDPRR19,
  author       = {Hao Chen and
                  Ilaria Chillotti and
                  Yihe Dong and
                  Oxana Poburinnaya and
                  Ilya P. Razenshteyn and
                  M. Sadegh Riazi},
  title        = {{SANNS:} Scaling Up Secure Approximate k-Nearest Neighbors Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {359},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/359},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenCDPRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChaseGP19,
  author       = {Melissa Chase and
                  Esha Ghosh and
                  Oxana Poburinnaya},
  title        = {Secret Shared Shuffle},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1340},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1340},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChaseGP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiPP18,
  author       = {Ran Canetti and
                  Sunoo Park and
                  Oxana Poburinnaya},
  title        = {Fully Bideniable Interactive Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1244},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiPP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CanettiP017,
  author       = {Ran Canetti and
                  Oxana Poburinnaya and
                  Mariana Raykova},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Optimal-Rate Non-Committing Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10626},
  pages        = {212--241},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70700-6\_8},
  doi          = {10.1007/978-3-319-70700-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/CanettiP017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CanettiPV17,
  author       = {Ran Canetti and
                  Oxana Poburinnaya and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Serge Fehr},
  title        = {Better Two-Round Adaptive Multi-party Computation},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {396--427},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_14},
  doi          = {10.1007/978-3-662-54388-7\_14},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CanettiPV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/CanettiPV17,
  author       = {Ran Canetti and
                  Oxana Poburinnaya and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Hamed Hatami and
                  Pierre McKenzie and
                  Valerie King},
  title        = {Equivocating Yao: constant-round adaptively secure multiparty computation
                  in the plain model},
  booktitle    = {Proceedings of the 49th Annual {ACM} {SIGACT} Symposium on Theory
                  of Computing, {STOC} 2017, Montreal, QC, Canada, June 19-23, 2017},
  pages        = {497--509},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055399.3055495},
  doi          = {10.1145/3055399.3055495},
  timestamp    = {Sun, 02 Jun 2019 21:10:31 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/CanettiPV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiPR16,
  author       = {Ran Canetti and
                  Oxana Poburinnaya and
                  Mariana Raykova},
  title        = {Optimal-Rate Non-Committing Encryption in a {CRS} Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {511},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/511},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiPR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiP16,
  author       = {Ran Canetti and
                  Oxana Poburinnaya},
  title        = {Better Two-Round Adaptive Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {614},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/614},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiPV16,
  author       = {Ran Canetti and
                  Oxana Poburinnaya and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation
                  in the Plain Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1190},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiPV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/CanettiGP15,
  author       = {Ran Canetti and
                  Shafi Goldwasser and
                  Oxana Poburinnaya},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Adaptively Secure Two-Party Computation from Indistinguishability
                  Obfuscation},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9015},
  pages        = {557--585},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46497-7\_22},
  doi          = {10.1007/978-3-662-46497-7\_22},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/CanettiGP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiGP14,
  author       = {Ran Canetti and
                  Shafi Goldwasser and
                  Oxana Poburinnaya},
  title        = {Adaptively Secure Two-party Computation From Indistinguishability
                  Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {845},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/845},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiGP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics