Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Oxana Poburinnaya
@inproceedings{DBLP:conf/crypto/AcharyaHPV23, author = {Anasuya Acharya and Carmit Hazay and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Best of Both Worlds - Revisiting the Spymasters Double Agent Problem}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {328--359}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_11}, doi = {10.1007/978-3-031-38557-5\_11}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AcharyaHPV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AcharyaHPV23, author = {Anasuya Acharya and Carmit Hazay and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam}, title = {Best of Both Worlds: Revisiting the Spymasters Double Agent Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1013}, year = {2023}, url = {https://eprint.iacr.org/2023/1013}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AcharyaHPV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/CanettiPV22, author = {Ran Canetti and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam}, title = {Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model}, journal = {{SIAM} J. Comput.}, volume = {51}, number = {2}, pages = {17--333}, year = {2022}, url = {https://doi.org/10.1137/17m1151602}, doi = {10.1137/17M1151602}, timestamp = {Mon, 27 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/CanettiPV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BangaloreOPV22, author = {Laasya Bangalore and Rafail Ostrovsky and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Adaptively Secure Computation for {RAM} Programs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {187--216}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_7}, doi = {10.1007/978-3-031-07085-3\_7}, timestamp = {Tue, 31 May 2022 17:23:10 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BangaloreOPV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CanettiCKKPP22, author = {Ran Canetti and Suvradip Chakraborty and Dakshita Khurana and Nishant Kumar and Oxana Poburinnaya and Manoj Prabhakaran}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {COA-Secure Obfuscation and Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {731--758}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_25}, doi = {10.1007/978-3-031-06944-4\_25}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/CanettiCKKPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiCKKPP22, author = {Ran Canetti and Suvradip Chakraborty and Dakshita Khurana and Nishant Kumar and Oxana Poburinnaya and Manoj Prabhakaran}, title = {COA-Secure Obfuscation and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1781}, year = {2022}, url = {https://eprint.iacr.org/2022/1781}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiCKKPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChaseGP20, author = {Melissa Chase and Esha Ghosh and Oxana Poburinnaya}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Secret-Shared Shuffle}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {342--372}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_12}, doi = {10.1007/978-3-030-64840-4\_12}, timestamp = {Thu, 10 Dec 2020 10:11:44 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChaseGP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CanettiPP20, author = {Ran Canetti and Sunoo Park and Oxana Poburinnaya}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Fully Deniable Interactive Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {807--835}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_27}, doi = {10.1007/978-3-030-56784-2\_27}, timestamp = {Wed, 12 Aug 2020 14:16:56 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CanettiPP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CanettiP20, author = {Ran Canetti and Oxana Poburinnaya}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Towards Multiparty Computation Withstanding Coercion of All Parties}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12551}, pages = {410--438}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64378-2\_15}, doi = {10.1007/978-3-030-64378-2\_15}, timestamp = {Tue, 15 Dec 2020 12:01:12 +0100}, biburl = {https://dblp.org/rec/conf/tcc/CanettiP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/0030CDPRR20, author = {Hao Chen and Ilaria Chillotti and Yihe Dong and Oxana Poburinnaya and Ilya P. Razenshteyn and M. Sadegh Riazi}, editor = {Srdjan Capkun and Franziska Roesner}, title = {{SANNS:} Scaling Up Secure Approximate k-Nearest Neighbors Search}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {2111--2128}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/chen-hao}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/0030CDPRR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiP20, author = {Ran Canetti and Oxana Poburinnaya}, title = {Towards Multiparty Computation Withstanding Coercion of All Parties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1434}, year = {2020}, url = {https://eprint.iacr.org/2020/1434}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/CanettiP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Poburinnaya19, author = {Oxana Poburinnaya}, title = {Studies in incoercible and adaptively secure computation}, school = {Boston University, {USA}}, year = {2019}, url = {https://hdl.handle.net/2144/41669}, timestamp = {Fri, 13 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Poburinnaya19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-02033, author = {Hao Chen and Ilaria Chillotti and Yihe Dong and Oxana Poburinnaya and Ilya P. Razenshteyn and M. Sadegh Riazi}, title = {{SANNS:} Scaling Up Secure Approximate k-Nearest Neighbors Search}, journal = {CoRR}, volume = {abs/1904.02033}, year = {2019}, url = {http://arxiv.org/abs/1904.02033}, eprinttype = {arXiv}, eprint = {1904.02033}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-02033.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCDPRR19, author = {Hao Chen and Ilaria Chillotti and Yihe Dong and Oxana Poburinnaya and Ilya P. Razenshteyn and M. Sadegh Riazi}, title = {{SANNS:} Scaling Up Secure Approximate k-Nearest Neighbors Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {359}, year = {2019}, url = {https://eprint.iacr.org/2019/359}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenCDPRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChaseGP19, author = {Melissa Chase and Esha Ghosh and Oxana Poburinnaya}, title = {Secret Shared Shuffle}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1340}, year = {2019}, url = {https://eprint.iacr.org/2019/1340}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChaseGP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiPP18, author = {Ran Canetti and Sunoo Park and Oxana Poburinnaya}, title = {Fully Bideniable Interactive Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1244}, year = {2018}, url = {https://eprint.iacr.org/2018/1244}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiPP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/CanettiP017, author = {Ran Canetti and Oxana Poburinnaya and Mariana Raykova}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Optimal-Rate Non-Committing Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10626}, pages = {212--241}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70700-6\_8}, doi = {10.1007/978-3-319-70700-6\_8}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/CanettiP017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CanettiPV17, author = {Ran Canetti and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam}, editor = {Serge Fehr}, title = {Better Two-Round Adaptive Multi-party Computation}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {396--427}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_14}, doi = {10.1007/978-3-662-54388-7\_14}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CanettiPV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/CanettiPV17, author = {Ran Canetti and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam}, editor = {Hamed Hatami and Pierre McKenzie and Valerie King}, title = {Equivocating Yao: constant-round adaptively secure multiparty computation in the plain model}, booktitle = {Proceedings of the 49th Annual {ACM} {SIGACT} Symposium on Theory of Computing, {STOC} 2017, Montreal, QC, Canada, June 19-23, 2017}, pages = {497--509}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055399.3055495}, doi = {10.1145/3055399.3055495}, timestamp = {Sun, 02 Jun 2019 21:10:31 +0200}, biburl = {https://dblp.org/rec/conf/stoc/CanettiPV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiPR16, author = {Ran Canetti and Oxana Poburinnaya and Mariana Raykova}, title = {Optimal-Rate Non-Committing Encryption in a {CRS} Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {511}, year = {2016}, url = {http://eprint.iacr.org/2016/511}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiP16, author = {Ran Canetti and Oxana Poburinnaya}, title = {Better Two-Round Adaptive Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {614}, year = {2016}, url = {http://eprint.iacr.org/2016/614}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiPV16, author = {Ran Canetti and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam}, title = {Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1190}, year = {2016}, url = {http://eprint.iacr.org/2016/1190}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiPV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/CanettiGP15, author = {Ran Canetti and Shafi Goldwasser and Oxana Poburinnaya}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9015}, pages = {557--585}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46497-7\_22}, doi = {10.1007/978-3-662-46497-7\_22}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/CanettiGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiGP14, author = {Ran Canetti and Shafi Goldwasser and Oxana Poburinnaya}, title = {Adaptively Secure Two-party Computation From Indistinguishability Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {845}, year = {2014}, url = {http://eprint.iacr.org/2014/845}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiGP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.