BibTeX records: Mike Rosulek

download as .bib file

@article{DBLP:journals/popets/DavisPRS23,
  author       = {Hannah Davis and
                  Christopher Patton and
                  Mike Rosulek and
                  Phillipp Schoppmann},
  title        = {Verifiable Distributed Aggregation Functions},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {4},
  pages        = {578--592},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0126},
  doi          = {10.56553/POPETS-2023-0126},
  timestamp    = {Thu, 17 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/DavisPRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GarimellaRS23,
  author       = {Gayathri Garimella and
                  Mike Rosulek and
                  Jaspal Singh},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Malicious Secure, Structure-Aware Private Set Intersection},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {577--610},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_19},
  doi          = {10.1007/978-3-031-38557-5\_19},
  timestamp    = {Mon, 14 Aug 2023 16:16:25 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GarimellaRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2023,
  editor       = {Mike Rosulek},
  title        = {Topics in Cryptology - {CT-RSA} 2023 - Cryptographers' Track at the
                  {RSA} Conference 2023, San Francisco, CA, USA, April 24-27, 2023,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13871},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30872-7},
  doi          = {10.1007/978-3-031-30872-7},
  isbn         = {978-3-031-30871-0},
  timestamp    = {Sat, 22 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavisPRS23,
  author       = {Hannah Davis and
                  Christopher Patton and
                  Mike Rosulek and
                  Phillipp Schoppmann},
  title        = {Verifiable Distributed Aggregation Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {130},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/130},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DavisPRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarimellaRS23,
  author       = {Gayathri Garimella and
                  Mike Rosulek and
                  Jaspal Singh},
  title        = {Malicious Secure, Structure-Aware Private Set Intersection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1166},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1166},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarimellaRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GarimellaRS22,
  author       = {Gayathri Garimella and
                  Mike Rosulek and
                  Jaspal Singh},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Structure-Aware Private Set Intersection, with Applications to Fuzzy
                  Matching},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {323--352},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_12},
  doi          = {10.1007/978-3-031-15802-5\_12},
  timestamp    = {Wed, 19 Oct 2022 17:37:44 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GarimellaRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/HollenbergRR22,
  author       = {Tommy Hollenberg and
                  Mike Rosulek and
                  Lawrence Roy},
  title        = {A Complete Characterization of Security for Linicrypt Block Cipher
                  Modes},
  booktitle    = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa,
                  Israel, August 7-10, 2022},
  pages        = {439--454},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CSF54842.2022.9919676},
  doi          = {10.1109/CSF54842.2022.9919676},
  timestamp    = {Fri, 11 Nov 2022 16:53:14 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/HollenbergRR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BeauregardXR22,
  author       = {Tyler Beauregard and
                  Janabel Xia and
                  Mike Rosulek},
  editor       = {Clemente Galdi and
                  Stanislaw Jarecki},
  title        = {Finding One Common Item, Privately},
  booktitle    = {Security and Cryptography for Networks - 13th International Conference,
                  {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13409},
  pages        = {462--480},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-14791-3\_20},
  doi          = {10.1007/978-3-031-14791-3\_20},
  timestamp    = {Wed, 07 Sep 2022 17:42:21 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/BeauregardXR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/McQuoidRX22,
  author       = {Ian McQuoid and
                  Mike Rosulek and
                  Jiayu Xu},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {How to Obfuscate {MPC} Inputs},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13748},
  pages        = {151--180},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22365-5\_6},
  doi          = {10.1007/978-3-031-22365-5\_6},
  timestamp    = {Fri, 23 Dec 2022 17:47:38 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/McQuoidRX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RoyLJR22,
  author       = {Lawrence Roy and
                  Stanislav Lyakhov and
                  Yeongjin Jang and
                  Mike Rosulek},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Practical Privacy-Preserving Authentication for {SSH}},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {3345--3362},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/roy},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RoyLJR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeauregardXR22,
  author       = {Tyler Beauregard and
                  Janabel Xia and
                  Mike Rosulek},
  title        = {Finding One Common Item, Privately},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {573},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/573},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeauregardXR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RoyLJR22,
  author       = {Lawrence Roy and
                  Stanislav Lyakhov and
                  Yeongjin Jang and
                  Mike Rosulek},
  title        = {Practical Privacy-Preserving Authentication for {SSH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {740},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/740},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RoyLJR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarimellaRS22,
  author       = {Gayathri Garimella and
                  Mike Rosulek and
                  Jaspal Singh},
  title        = {Structure-Aware Private Set Intersection, With Applications to Fuzzy
                  Matching},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1011},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1011},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarimellaRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HollenbergRR22,
  author       = {Tommy Hollenberg and
                  Mike Rosulek and
                  Lawrence Roy},
  title        = {A Complete Characterization of Security for Linicrypt Block Cipher
                  Modes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1033},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1033},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HollenbergRR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McQuoidRX22,
  author       = {Ian McQuoid and
                  Mike Rosulek and
                  Jiayu Xu},
  title        = {How to Obfuscate {MPC} Inputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1463},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1463},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/McQuoidRX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/RajabiBRWF21,
  author       = {Arezoo Rajabi and
                  Rakesh B. Bobba and
                  Mike Rosulek and
                  Charles V. Wright and
                  Wu{-}chi Feng},
  title        = {On the (Im)Practicality of Adversarial Perturbation for Image Privacy},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2021},
  number       = {1},
  pages        = {85--106},
  year         = {2021},
  url          = {https://doi.org/10.2478/popets-2021-0006},
  doi          = {10.2478/POPETS-2021-0006},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/RajabiBRWF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/McQuoidRR21,
  author       = {Ian McQuoid and
                  Mike Rosulek and
                  Lawrence Roy},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Batching Base Oblivious Transfers},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13092},
  pages        = {281--310},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92078-4\_10},
  doi          = {10.1007/978-3-030-92078-4\_10},
  timestamp    = {Fri, 03 Dec 2021 17:36:40 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/McQuoidRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RosulekT21,
  author       = {Mike Rosulek and
                  Ni Trieu},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Compact and Malicious Private Set Intersection for Small Sets},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1166--1181},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484778},
  doi          = {10.1145/3460120.3484778},
  timestamp    = {Tue, 16 Nov 2021 12:59:46 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RosulekT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/RosulekR21,
  author       = {Mike Rosulek and
                  Lawrence Roy},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Three Halves Make a Whole? Beating the Half-Gates Lower Bound for
                  Garbled Circuits},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {94--124},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_5},
  doi          = {10.1007/978-3-030-84242-0\_5},
  timestamp    = {Mon, 16 Aug 2021 09:08:14 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/RosulekR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GarimellaPRTY21,
  author       = {Gayathri Garimella and
                  Benny Pinkas and
                  Mike Rosulek and
                  Ni Trieu and
                  Avishay Yanai},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Oblivious Key-Value Stores and Amplification for Private Set Intersection},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {395--425},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_14},
  doi          = {10.1007/978-3-030-84245-1\_14},
  timestamp    = {Mon, 16 Aug 2021 09:08:14 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GarimellaPRTY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GarimellaMRSS21,
  author       = {Gayathri Garimella and
                  Payman Mohassel and
                  Mike Rosulek and
                  Saeed Sadeghian and
                  Jaspal Singh},
  editor       = {Juan A. Garay},
  title        = {Private Set Operations from Oblivious Switching},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {591--617},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_21},
  doi          = {10.1007/978-3-030-75248-4\_21},
  timestamp    = {Fri, 07 May 2021 15:40:46 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GarimellaMRSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarimellaMRSS21,
  author       = {Gayathri Garimella and
                  Payman Mohassel and
                  Mike Rosulek and
                  Seyed Saeed Sadeghian and
                  Jaspal Singh},
  title        = {Private Set Operations from Oblivious Switching},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/243},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarimellaMRSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McQuoidRR21,
  author       = {Ian McQuoid and
                  Mike Rosulek and
                  Lawrence Roy},
  title        = {Batching Base Oblivious Transfers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {682},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/682},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McQuoidRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RosulekR21,
  author       = {Mike Rosulek and
                  Lawrence Roy},
  title        = {Three Halves Make a Whole? Beating the Half-Gates Lower Bound for
                  Garbled Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {749},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/749},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RosulekR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GarimellaPRTY21,
  author       = {Gayathri Garimella and
                  Benny Pinkas and
                  Mike Rosulek and
                  Ni Trieu and
                  Avishay Yanai},
  title        = {Oblivious Key-Value Stores and Amplification for Private Set Intersection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {883},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/883},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GarimellaPRTY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RosulekT21,
  author       = {Mike Rosulek and
                  Ni Trieu},
  title        = {Compact and Malicious Private Set Intersection for Small Sets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1159},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1159},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RosulekT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/MohasselRT20,
  author       = {Payman Mohassel and
                  Mike Rosulek and
                  Ni Trieu},
  title        = {Practical Privacy-Preserving K-means Clustering},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2020},
  number       = {4},
  pages        = {414--433},
  year         = {2020},
  url          = {https://doi.org/10.2478/popets-2020-0080},
  doi          = {10.2478/POPETS-2020-0080},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/MohasselRT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/McQuoidRR20,
  author       = {Ian McQuoid and
                  Mike Rosulek and
                  Lawrence Roy},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Minimal Symmetric {PAKE} and 1-out-of-N {OT} from Programmable-Once
                  Public Functions},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {425--442},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417870},
  doi          = {10.1145/3372297.3417870},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/McQuoidRR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MohasselRR20,
  author       = {Payman Mohassel and
                  Peter Rindal and
                  Mike Rosulek},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Fast Database Joins and {PSI} for Secret Shared Data},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1271--1287},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3423358},
  doi          = {10.1145/3372297.3423358},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MohasselRR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PinkasRTY20,
  author       = {Benny Pinkas and
                  Mike Rosulek and
                  Ni Trieu and
                  Avishay Yanai},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {{PSI} from PaXoS: Fast, Malicious Private Set Intersection},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12106},
  pages        = {739--767},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45724-2\_25},
  doi          = {10.1007/978-3-030-45724-2\_25},
  timestamp    = {Mon, 04 May 2020 14:32:28 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/PinkasRTY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PinkasRTY20,
  author       = {Benny Pinkas and
                  Mike Rosulek and
                  Ni Trieu and
                  Avishay Yanai},
  title        = {{PSI} from PaXoS: Fast, Malicious Private Set Intersection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {193},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/193},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PinkasRTY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McQuoidRR20,
  author       = {Ian McQuoid and
                  Mike Rosulek and
                  Lawrence Roy},
  title        = {Minimal Symmetric {PAKE} and 1-out-of-N {OT} from Programmable-Once
                  Public Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1043},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1043},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McQuoidRR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GroceRR19,
  author       = {Adam Groce and
                  Peter Rindal and
                  Mike Rosulek},
  title        = {Cheaper Private Set Intersection via Differentially Private Leakage},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2019},
  number       = {3},
  pages        = {6--25},
  year         = {2019},
  url          = {https://doi.org/10.2478/popets-2019-0034},
  doi          = {10.2478/POPETS-2019-0034},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/GroceRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KolesnikovRT019,
  author       = {Vladimir Kolesnikov and
                  Mike Rosulek and
                  Ni Trieu and
                  Xiao Wang},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Scalable Private Set Union from Symmetric-Key Techniques},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11922},
  pages        = {636--666},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34621-8\_23},
  doi          = {10.1007/978-3-030-34621-8\_23},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KolesnikovRT019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Gilad-BachrachL19,
  author       = {Ran Gilad{-}Bachrach and
                  Kim Laine and
                  Kristin E. Lauter and
                  Peter Rindal and
                  Mike Rosulek},
  editor       = {Radu Sion and
                  Charalampos Papamanthou},
  title        = {Secure Data Exchange: {A} Marketplace in the Cloud},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Cloud Computing
                  Security Workshop, CCSW@CCS 2019, London, UK, November 11, 2019},
  pages        = {117--128},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338466.3358924},
  doi          = {10.1145/3338466.3358924},
  timestamp    = {Thu, 12 Oct 2023 12:32:09 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Gilad-BachrachL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PinkasRTY19,
  author       = {Benny Pinkas and
                  Mike Rosulek and
                  Ni Trieu and
                  Avishay Yanai},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {SpOT-Light: Lightweight Private Set Intersection from Sparse {OT}
                  Extension},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {401--431},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_13},
  doi          = {10.1007/978-3-030-26954-8\_13},
  timestamp    = {Fri, 09 Aug 2019 14:27:02 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PinkasRTY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/TajikGDEBRWF19,
  author       = {Kimia Tajik and
                  Akshith Gunasekaran and
                  Rhea Dutta and
                  Brandon Ellis and
                  Rakesh B. Bobba and
                  Mike Rosulek and
                  Charles V. Wright and
                  Wu{-}chi Feng},
  title        = {Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption},
  booktitle    = {26th Annual Network and Distributed System Security Symposium, {NDSS}
                  2019, San Diego, California, USA, February 24-27, 2019},
  publisher    = {The Internet Society},
  year         = {2019},
  url          = {https://www.ndss-symposium.org/ndss-paper/balancing-image-privacy-and-usability-with-thumbnail-preserving-encryption/},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ndss/TajikGDEBRWF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/McQuoidSR19,
  author       = {Ian McQuoid and
                  Trevor Swope and
                  Mike Rosulek},
  editor       = {Dennis Hofheinz and
                  Alon Rosen},
  title        = {Characterizing Collision and Second-Preimage Resistance in Linicrypt},
  booktitle    = {Theory of Cryptography - 17th International Conference, {TCC} 2019,
                  Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11891},
  pages        = {451--470},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36030-6\_18},
  doi          = {10.1007/978-3-030-36030-6\_18},
  timestamp    = {Mon, 25 Nov 2019 13:58:16 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/McQuoidSR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GroceRR19,
  author       = {Adam Groce and
                  Peter Rindal and
                  Mike Rosulek},
  title        = {Cheaper Private Set Intersection via Differentially Private Leakage},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {239},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/239},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GroceRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TajikGDEBRWF19,
  author       = {Kimia Tajik and
                  Akshith Gunasekaran and
                  Rhea Dutta and
                  Brandon Ellis and
                  Rakesh B. Bobba and
                  Mike Rosulek and
                  Charles V. Wright and
                  Wu{-}chi Feng},
  title        = {Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {295},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/295},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TajikGDEBRWF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallCMRS19,
  author       = {Marshall Ball and
                  Brent Carmer and
                  Tal Malkin and
                  Mike Rosulek and
                  Nichole Schimanski},
  title        = {Garbled Neural Networks are Practical},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/338},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallCMRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohasselRR19,
  author       = {Payman Mohassel and
                  Peter Rindal and
                  Mike Rosulek},
  title        = {Fast Database Joins for Secret Shared Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {518},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/518},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MohasselRR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PinkasRTY19,
  author       = {Benny Pinkas and
                  Mike Rosulek and
                  Ni Trieu and
                  Avishay Yanai},
  title        = {SpOT-Light: Lightweight Private Set Intersection from Sparse {OT}
                  Extension},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {634},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/634},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PinkasRTY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovRTW19,
  author       = {Vladimir Kolesnikov and
                  Mike Rosulek and
                  Ni Trieu and
                  Xiao Wang},
  title        = {Scalable Private Set Union from Symmetric-Key Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {776},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/776},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolesnikovRTW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohasselRT19,
  author       = {Payman Mohassel and
                  Mike Rosulek and
                  Ni Trieu},
  title        = {Practical Privacy-Preserving K-means Clustering},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1158},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1158},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MohasselRT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftsec/EvansKR18,
  author       = {David Evans and
                  Vladimir Kolesnikov and
                  Mike Rosulek},
  title        = {A Pragmatic Introduction to Secure Multi-Party Computation},
  journal      = {Found. Trends Priv. Secur.},
  volume       = {2},
  number       = {2-3},
  pages        = {70--246},
  year         = {2018},
  url          = {https://doi.org/10.1561/3300000019},
  doi          = {10.1561/3300000019},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ftsec/EvansKR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/DemmlerRRT18,
  author       = {Daniel Demmler and
                  Peter Rindal and
                  Mike Rosulek and
                  Ni Trieu},
  title        = {{PIR-PSI:} Scaling Private Contact Discovery},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2018},
  number       = {4},
  pages        = {159--178},
  year         = {2018},
  url          = {https://doi.org/10.1515/popets-2018-0037},
  doi          = {10.1515/POPETS-2018-0037},
  timestamp    = {Tue, 01 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/DemmlerRRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BehniaOYR18,
  author       = {Rouzbeh Behnia and
                  Muslum Ozgur Ozmen and
                  Attila A. Yavuz and
                  Mike Rosulek},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {{TACHYON:} Fast Signatures from Compact Knapsack},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1855--1867},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243819},
  doi          = {10.1145/3243734.3243819},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/BehniaOYR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KatzRR018,
  author       = {Jonathan Katz and
                  Samuel Ranellucci and
                  Mike Rosulek and
                  Xiao Wang},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Optimizing Authenticated Garbling for Faster Secure Two-Party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {365--391},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_13},
  doi          = {10.1007/978-3-319-96878-0\_13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KatzRR018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KolesnikovRT18,
  author       = {Vladimir Kolesnikov and
                  Mike Rosulek and
                  Ni Trieu},
  editor       = {Sarah Meiklejohn and
                  Kazue Sako},
  title        = {SWiM: Secure Wildcard Pattern Matching from {OT} Extension},
  booktitle    = {Financial Cryptography and Data Security - 22nd International Conference,
                  {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10957},
  pages        = {222--240},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-662-58387-6\_12},
  doi          = {10.1007/978-3-662-58387-6\_12},
  timestamp    = {Fri, 30 Aug 2019 11:17:01 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KolesnikovRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/RosulekS18,
  author       = {Mike Rosulek and
                  Morgan Shirley},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {On the Structure of Unconditional {UC} Hybrid Protocols},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11240},
  pages        = {98--126},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03810-6\_4},
  doi          = {10.1007/978-3-030-03810-6\_4},
  timestamp    = {Sat, 09 Apr 2022 12:44:08 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/RosulekS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/McQuoidSR18,
  author       = {Ian McQuoid and
                  Trevor Swope and
                  Mike Rosulek},
  title        = {Characterizing Collision and Second-Preimage Resistance in Linicrypt},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {458},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/458},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/McQuoidSR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatzRRW18,
  author       = {Jonathan Katz and
                  Samuel Ranellucci and
                  Mike Rosulek and
                  Xiao Wang},
  title        = {Optimizing Authenticated Garbling for Faster Secure Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {578},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/578},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatzRRW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DemmlerRRT18,
  author       = {Daniel Demmler and
                  Peter Rindal and
                  Mike Rosulek and
                  Ni Trieu},
  title        = {{PIR-PSI:} Scaling Private Contact Discovery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {579},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/579},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DemmlerRRT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BehniaOYR18,
  author       = {Rouzbeh Behnia and
                  Muslum Ozgur Ozmen and
                  Attila A. Yavuz and
                  Mike Rosulek},
  title        = {{TACHYON:} Fast Signatures from Compact Knapsack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {873},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/873},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BehniaOYR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/PrabhakaranR17,
  author       = {Manoj Prabhakaran and
                  Mike Rosulek},
  title        = {Reconciling Non-malleability with Homomorphic Encryption},
  journal      = {J. Cryptol.},
  volume       = {30},
  number       = {3},
  pages        = {601--671},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00145-016-9231-y},
  doi          = {10.1007/S00145-016-9231-Y},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/PrabhakaranR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KolesnikovNRTT17,
  author       = {Vladimir Kolesnikov and
                  Jesper Buus Nielsen and
                  Mike Rosulek and
                  Ni Trieu and
                  Roberto Trifiletti},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{DUPLO:} Unifying Cut-and-Choose for Garbled Circuits},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {3--20},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3133991},
  doi          = {10.1145/3133956.3133991},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KolesnikovNRTT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MarohnWFRB17,
  author       = {Byron Marohn and
                  Charles V. Wright and
                  Wu{-}chi Feng and
                  Mike Rosulek and
                  Rakesh B. Bobba},
  editor       = {Roger A. Hallman and
                  Kurt Rohloff and
                  Victor I. Chang},
  title        = {Approximate Thumbnail Preserving Encryption},
  booktitle    = {Proceedings of the 2017 on Multimedia Privacy and Security, MPS@CCS
                  2017, Dallas, TX, USA, October 30, 2017},
  pages        = {33--43},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3137616.3137621},
  doi          = {10.1145/3137616.3137621},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MarohnWFRB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RindalR17,
  author       = {Peter Rindal and
                  Mike Rosulek},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Malicious-Secure Private Set Intersection via Dual Execution},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1229--1242},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134044},
  doi          = {10.1145/3133956.3134044},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RindalR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KolesnikovMPRT17,
  author       = {Vladimir Kolesnikov and
                  Naor Matania and
                  Benny Pinkas and
                  Mike Rosulek and
                  Ni Trieu},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Practical Multi-party Private Set Intersection from Symmetric-Key
                  Techniques},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {1257--1272},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134065},
  doi          = {10.1145/3133956.3134065},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KolesnikovMPRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/RindalR17,
  author       = {Peter Rindal and
                  Mike Rosulek},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Improved Private Set Intersection Against Malicious Adversaries},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10210},
  pages        = {235--259},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56620-7\_9},
  doi          = {10.1007/978-3-319-56620-7\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/RindalR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MohasselR17,
  author       = {Payman Mohassel and
                  Mike Rosulek},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Non-interactive Secure 2PC in the Offline/Online and Batch Settings},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10212},
  pages        = {425--455},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56617-7\_15},
  doi          = {10.1007/978-3-319-56617-7\_15},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MohasselR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MohasselRS17,
  author       = {Payman Mohassel and
                  Mike Rosulek and
                  Alessandra Scafuro},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Sublinear Zero-Knowledge Arguments for {RAM} Programs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10210},
  pages        = {501--531},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56620-7\_18},
  doi          = {10.1007/978-3-319-56620-7\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MohasselRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Rosulek17,
  author       = {Mike Rosulek},
  editor       = {Arpita Patra and
                  Nigel P. Smart},
  title        = {Improvements for Gate-Hiding Garbled Circuits},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2017 - 18th International Conference
                  on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10698},
  pages        = {325--345},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-71667-1\_17},
  doi          = {10.1007/978-3-319-71667-1\_17},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Rosulek17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AfsharMR17,
  author       = {Arash Afshar and
                  Payman Mohassel and
                  Mike Rosulek},
  title        = {Efficient Maliciously Secure Two Party Computation for Mixed Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {62},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/062},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AfsharMR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohasselR17,
  author       = {Payman Mohassel and
                  Mike Rosulek},
  title        = {Non-Interactive Secure 2PC in the Offline/Online and Batch Settings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {125},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/125},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MohasselR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohasselRS17,
  author       = {Payman Mohassel and
                  Mike Rosulek and
                  Alessandra Scafuro},
  title        = {Sublinear Zero-Knowledge Arguments for {RAM} Programs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {129},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/129},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MohasselRS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovNRTT17,
  author       = {Vladimir Kolesnikov and
                  Jesper Buus Nielsen and
                  Mike Rosulek and
                  Ni Trieu and
                  Roberto Trifiletti},
  title        = {{DUPLO:} Unifying Cut-and-Choose for Garbled Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {344},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/344},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolesnikovNRTT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RosulekS17,
  author       = {Mike Rosulek and
                  Morgan Shirley},
  title        = {On the Structure of Unconditional {UC} Hybrid Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {464},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/464},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RosulekS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RindalR17,
  author       = {Peter Rindal and
                  Mike Rosulek},
  title        = {Malicious-Secure Private Set Intersection via Dual Execution},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {769},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/769},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RindalR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovMPRT17,
  author       = {Vladimir Kolesnikov and
                  Naor Matania and
                  Benny Pinkas and
                  Mike Rosulek and
                  Ni Trieu},
  title        = {Practical Multi-party Private Set Intersection from Symmetric-Key
                  Techniques},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {799},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/799},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolesnikovMPRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rosulek17,
  author       = {Mike Rosulek},
  title        = {Improvements for Gate-Hiding Garbled Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {976},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/976},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rosulek17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MarohnWFRB17,
  author       = {Byron Marohn and
                  Charles V. Wright and
                  Wu{-}chi Feng and
                  Mike Rosulek and
                  Rakesh B. Bobba},
  title        = {Approximate Thumbnail Preserving Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1046},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1046},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MarohnWFRB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovRT17,
  author       = {Vladimir Kolesnikov and
                  Mike Rosulek and
                  Ni Trieu},
  title        = {SWiM: Secure Wildcard Pattern Matching From {OT} Extension},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1150},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1150},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolesnikovRT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BallMR16,
  author       = {Marshall Ball and
                  Tal Malkin and
                  Mike Rosulek},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Garbling Gadgets for Boolean and Arithmetic Circuits},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {565--577},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978410},
  doi          = {10.1145/2976749.2978410},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BallMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KolesnikovKRT16,
  author       = {Vladimir Kolesnikov and
                  Ranjit Kumaresan and
                  Mike Rosulek and
                  Ni Trieu},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {Efficient Batched Oblivious {PRF} with Applications to Private Set
                  Intersection},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {818--829},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2978381},
  doi          = {10.1145/2976749.2978381},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KolesnikovKRT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CarmerR16,
  author       = {Brent Carmer and
                  Mike Rosulek},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Linicrypt: {A} Model for Practical Cryptography},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {416--445},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_15},
  doi          = {10.1007/978-3-662-53015-3\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/CarmerR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RindalR16,
  author       = {Peter Rindal and
                  Mike Rosulek},
  editor       = {Thorsten Holz and
                  Stefan Savage},
  title        = {Faster Malicious 2-Party Secure Computation with Online/Offline Dual
                  Execution},
  booktitle    = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX,
                  USA, August 10-12, 2016},
  pages        = {297--314},
  publisher    = {{USENIX} Association},
  year         = {2016},
  url          = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/rindal},
  timestamp    = {Mon, 01 Feb 2021 08:43:18 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/RindalR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarmerR16,
  author       = {Brent Carmer and
                  Mike Rosulek},
  title        = {Linicrypt: {A} Model for Practical Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {548},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/548},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarmerR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Gilad-BachrachL16,
  author       = {Ran Gilad{-}Bachrach and
                  Kim Laine and
                  Kristin E. Lauter and
                  Peter Rindal and
                  Mike Rosulek},
  title        = {Secure Data Exchange: {A} Marketplace in the Cloud},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {620},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/620},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Gilad-BachrachL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RindalR16,
  author       = {Peter Rindal and
                  Mike Rosulek},
  title        = {Faster Malicious 2-party Secure Computation with Online/Ofine Dual
                  Execution},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {632},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/632},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RindalR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RindalR16a,
  author       = {Peter Rindal and
                  Mike Rosulek},
  title        = {Improved Private Set Intersection against Malicious Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {746},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/746},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RindalR16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovKRT16,
  author       = {Vladimir Kolesnikov and
                  Ranjit Kumaresan and
                  Mike Rosulek and
                  Ni Trieu},
  title        = {Efficient Batched Oblivious {PRF} with Applications to Private Set
                  Intersection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {799},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/799},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolesnikovKRT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BallMR16,
  author       = {Marshall Ball and
                  Tal Malkin and
                  Mike Rosulek},
  title        = {Garbling Gadgets for Boolean and Arithmetic Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {969},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/969},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BallMR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/crossroads/Rosulek15,
  author       = {Mike Rosulek},
  title        = {Secure Your Data and Compute on It, Too},
  journal      = {{XRDS}},
  volume       = {21},
  number       = {3},
  pages        = {36--41},
  year         = {2015},
  url          = {https://doi.org/10.1145/2730910},
  doi          = {10.1145/2730910},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/crossroads/Rosulek15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MohasselRZ15,
  author       = {Payman Mohassel and
                  Mike Rosulek and
                  Ye Zhang},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {Fast and Secure Three-party Computation: The Garbled Circuit Approach},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {591--602},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2813705},
  doi          = {10.1145/2810103.2813705},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MohasselRZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HuMR15,
  author       = {Zhangxiang Hu and
                  Payman Mohassel and
                  Mike Rosulek},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Efficient Zero-Knowledge Proofs of Non-algebraic Statements with Sublinear
                  Amortized Cost},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {150--169},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_8},
  doi          = {10.1007/978-3-662-48000-7\_8},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HuMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ZahurRE15,
  author       = {Samee Zahur and
                  Mike Rosulek and
                  David Evans},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits
                  Using Half Gates},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9057},
  pages        = {220--250},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46803-6\_8},
  doi          = {10.1007/978-3-662-46803-6\_8},
  timestamp    = {Thu, 14 Oct 2021 09:58:15 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ZahurRE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AfsharHMR15,
  author       = {Arash Afshar and
                  Zhangxiang Hu and
                  Payman Mohassel and
                  Mike Rosulek},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {How to Efficiently Evaluate {RAM} Programs with Malicious Security},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9056},
  pages        = {702--729},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46800-5\_27},
  doi          = {10.1007/978-3-662-46800-5\_27},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AfsharHMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fie/CarmerR15,
  author       = {Brent Carmer and
                  Mike Rosulek},
  title        = {Vamonos: Embeddable visualizations of advanced algorithms},
  booktitle    = {2015 {IEEE} Frontiers in Education Conference, {FIE} 2015, El Paso,
                  TX, USA, October 21-24, 2015},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/FIE.2015.7344263},
  doi          = {10.1109/FIE.2015.7344263},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fie/CarmerR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KolesnikovMRR15,
  author       = {Vladimir Kolesnikov and
                  Payman Mohassel and
                  Ben Riva and
                  Mike Rosulek},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Richer Efficiency/Security Trade-offs in 2PC},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {229--259},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_11},
  doi          = {10.1007/978-3-662-46494-6\_11},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KolesnikovMRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovMRR15,
  author       = {Vladimir Kolesnikov and
                  Payman Mohassel and
                  Ben Riva and
                  Mike Rosulek},
  title        = {Richer Efficiency/Security Trade-offs in 2PC},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {55},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/055},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolesnikovMRR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuMR15,
  author       = {Zhangxiang Hu and
                  Payman Mohassel and
                  Mike Rosulek},
  title        = {Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear
                  Amortized Cost},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {497},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/497},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HuMR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MohasselRZ15,
  author       = {Payman Mohassel and
                  Mike Rosulek and
                  Ye Zhang},
  title        = {Fast and Secure Three-party Computation: The Garbled Circuit Approach},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {931},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/931},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MohasselRZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KolesnikovMR14,
  author       = {Vladimir Kolesnikov and
                  Payman Mohassel and
                  Mike Rosulek},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {FleXOR: Flexible Garbling for {XOR} Gates That Beats Free-XOR},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {440--457},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_25},
  doi          = {10.1007/978-3-662-44381-1\_25},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KolesnikovMR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KolesnikovMR14,
  author       = {Vladimir Kolesnikov and
                  Payman Mohassel and
                  Mike Rosulek},
  title        = {FleXOR: Flexible garbling for {XOR} gates that beats free-XOR},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {460},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/460},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KolesnikovMR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZahurRE14,
  author       = {Samee Zahur and
                  Mike Rosulek and
                  David Evans},
  title        = {Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits
                  using Half Gates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {756},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/756},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZahurRE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AfsharHMR14,
  author       = {Arash Afshar and
                  Zhangxiang Hu and
                  Payman Mohassel and
                  Mike Rosulek},
  title        = {How to Efficiently Evaluate {RAM} Programs with Malicious Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {759},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/759},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AfsharHMR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GordonMRW13,
  author       = {S. Dov Gordon and
                  Tal Malkin and
                  Mike Rosulek and
                  Hoeteck Wee},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {Multi-party Computation of Polynomials and Branching Programs without
                  Simultaneous Interaction},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {575--591},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_34},
  doi          = {10.1007/978-3-642-38348-9\_34},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GordonMRW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/JeffsR13,
  author       = {R. Amzi Jeffs and
                  Mike Rosulek},
  editor       = {Amit Sahai},
  title        = {Characterizing the Cryptographic Properties of Reactive 2-Party Functionalities},
  booktitle    = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC}
                  2013, Tokyo, Japan, March 3-6, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7785},
  pages        = {263--280},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36594-2\_15},
  doi          = {10.1007/978-3-642-36594-2\_15},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/JeffsR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ciss/MajiPR13,
  author       = {Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  editor       = {Manoj Prabhakaran and
                  Amit Sahai},
  title        = {Complexity of Multi-Party Computation Functionalities},
  booktitle    = {Secure Multi-Party Computation},
  series       = {Cryptology and Information Security Series},
  volume       = {10},
  pages        = {249--283},
  publisher    = {{IOS} Press},
  year         = {2013},
  url          = {https://doi.org/10.3233/978-1-61499-169-4-249},
  doi          = {10.3233/978-1-61499-169-4-249},
  timestamp    = {Wed, 17 Apr 2024 21:39:22 +0200},
  biburl       = {https://dblp.org/rec/series/ciss/MajiPR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MajiPR13,
  author       = {Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  title        = {Complexity of Multi-Party Computation Functionalities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/042},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MajiPR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GordonMRW13,
  author       = {S. Dov Gordon and
                  Tal Malkin and
                  Mike Rosulek and
                  Hoeteck Wee},
  title        = {Multi-Party Computation of Polynomials and Branching Programs without
                  Simultaneous Interaction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GordonMRW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Rosulek12,
  author       = {Mike Rosulek},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Must You Know the Code of f to Securely Compute f?},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {87--104},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_7},
  doi          = {10.1007/978-3-642-32009-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Rosulek12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Rosulek12a,
  author       = {Mike Rosulek},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Universal Composability from Essentially Any Trusted Setup},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {406--423},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_24},
  doi          = {10.1007/978-3-642-32009-5\_24},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Rosulek12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MajiPR12,
  author       = {Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  editor       = {Steven D. Galbraith and
                  Mridul Nandi},
  title        = {A Unified Characterization of Completeness and Triviality for Secure
                  Function Evaluation},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
                  on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7668},
  pages        = {40--59},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34931-7\_4},
  doi          = {10.1007/978-3-642-34931-7\_4},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/MajiPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rosulek12,
  author       = {Mike Rosulek},
  title        = {Must you know the code of f to securely compute f?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {455},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/455},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rosulek12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MajiPR11,
  author       = {Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  editor       = {Aggelos Kiayias},
  title        = {Attribute-Based Signatures},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
                  the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6558},
  pages        = {376--392},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19074-2\_24},
  doi          = {10.1007/978-3-642-19074-2\_24},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MajiPR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MajiOPR11,
  author       = {Hemanta K. Maji and
                  Pichayoot Ouppaphan and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  editor       = {Yuval Ishai},
  title        = {Exploring the Limits of Common Coins Using Frontier Analysis of Protocols},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {486--503},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_29},
  doi          = {10.1007/978-3-642-19571-6\_29},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MajiOPR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MajiOPR11,
  author       = {Hemanta K. Maji and
                  Pichayoot Ouppaphan and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  title        = {Exploring the Limits of Common Coins Using Frontier Analysis of Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {6},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/006},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MajiOPR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Rosulek11,
  author       = {Mike Rosulek},
  title        = {Universal Composability from Essentially Any Trusted Setup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {240},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/240},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Rosulek11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MajiPR10,
  author       = {Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  editor       = {Tal Rabin},
  title        = {A Zero-One Law for Cryptographic Complexity with Respect to Computational
                  {UC} Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {595--612},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_32},
  doi          = {10.1007/978-3-642-14623-7\_32},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MajiPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/innovations/MajiPR10,
  author       = {Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  editor       = {Andrew Chi{-}Chih Yao},
  title        = {Cryptographic Complexity Classes and Computational Intractability
                  Assumptions},
  booktitle    = {Innovations in Computer Science - {ICS} 2010, Tsinghua University,
                  Beijing, China, January 5-7, 2010. Proceedings},
  pages        = {266--289},
  publisher    = {Tsinghua University Press},
  year         = {2010},
  url          = {http://conference.iiis.tsinghua.edu.cn/ICS2010/content/papers/22.html},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/innovations/MajiPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MajiPR10,
  author       = {Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  title        = {A Zero-One Law for Deterministic 2-Party Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {98},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/098},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MajiPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MajiPR10a,
  author       = {Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  title        = {Attribute-Based Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {595},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/595},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MajiPR10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Rosulek09,
  author       = {Michael J. Rosulek},
  title        = {The Structure of Secure Multi-Party Computation},
  school       = {University of Illinois Urbana-Champaign, {USA}},
  year         = {2009},
  url          = {https://hdl.handle.net/2142/13698},
  timestamp    = {Fri, 13 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Rosulek09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/MajiPR09,
  author       = {Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  editor       = {Omer Reingold},
  title        = {Complexity of Multi-party Computation Problems: The Case of 2-Party
                  Symmetric Secure Function Evaluation},
  booktitle    = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC}
                  2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5444},
  pages        = {256--273},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00457-5\_16},
  doi          = {10.1007/978-3-642-00457-5\_16},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/MajiPR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/MajiPR09,
  author       = {Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  title        = {Cryptographic Complexity Classes and Computational Intractability
                  Assumptions},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR09-123}},
  year         = {2009},
  url          = {https://eccc.weizmann.ac.il/report/2009/123},
  eprinttype    = {ECCC},
  eprint       = {TR09-123},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/MajiPR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PrabhakaranR08,
  author       = {Manoj Prabhakaran and
                  Mike Rosulek},
  editor       = {Josef Pieprzyk},
  title        = {Towards Robust Computation on Encrypted Data},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {216--233},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_14},
  doi          = {10.1007/978-3-540-89255-7\_14},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PrabhakaranR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PrabhakaranR08,
  author       = {Manoj Prabhakaran and
                  Mike Rosulek},
  editor       = {David A. Wagner},
  title        = {Cryptographic Complexity of Multi-Party Computation Problems: Classifications
                  and Separations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {262--279},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_15},
  doi          = {10.1007/978-3-540-85174-5\_15},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PrabhakaranR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/PrabhakaranR08,
  author       = {Manoj Prabhakaran and
                  Mike Rosulek},
  editor       = {Luca Aceto and
                  Ivan Damg{\aa}rd and
                  Leslie Ann Goldberg and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir and
                  Igor Walukiewicz},
  title        = {Homomorphic Encryption with {CCA} Security},
  booktitle    = {Automata, Languages and Programming, 35th International Colloquium,
                  {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
                  {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
                  Track {C:} Security and Cryptography Foundations},
  series       = {Lecture Notes in Computer Science},
  volume       = {5126},
  pages        = {667--678},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70583-3\_54},
  doi          = {10.1007/978-3-540-70583-3\_54},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/PrabhakaranR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/PrabhakaranR08,
  author       = {Manoj Prabhakaran and
                  Mike Rosulek},
  title        = {Cryptographic Complexity of Multi-party Computation Problems: Classifications
                  and Separations},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR08-050}},
  year         = {2008},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2008/TR08-050/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR08-050},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/PrabhakaranR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PrabhakaranR08,
  author       = {Manoj Prabhakaran and
                  Mike Rosulek},
  title        = {Homomorphic Encryption with {CCA} Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {79},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/079},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PrabhakaranR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MajiPR08,
  author       = {Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  title        = {Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {328},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/328},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MajiPR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MajiPR08a,
  author       = {Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Mike Rosulek},
  title        = {Complexity of Multiparty Computation Problems: The Case of 2-Party
                  Symmetric Secure Function Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {454},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/454},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MajiPR08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/PrabhakaranR07,
  author       = {Manoj Prabhakaran and
                  Mike Rosulek},
  editor       = {Alfred Menezes},
  title        = {Rerandomizable {RCCA} Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4622},
  pages        = {517--534},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74143-5\_29},
  doi          = {10.1007/978-3-540-74143-5\_29},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/PrabhakaranR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/OlsonRW07,
  author       = {Lars E. Olson and
                  Michael J. Rosulek and
                  Marianne Winslett},
  editor       = {Peng Ning and
                  Ting Yu},
  title        = {Harvesting credentials in trust negotiation as an honest-but-curious
                  adversary},
  booktitle    = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007},
  pages        = {64--67},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314333.1314345},
  doi          = {10.1145/1314333.1314345},
  timestamp    = {Mon, 04 Apr 2022 16:00:14 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/OlsonRW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PrabhakaranR07,
  author       = {Manoj Prabhakaran and
                  Mike Rosulek},
  title        = {Rerandomizable {RCCA} Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {119},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/119},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PrabhakaranR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics