Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Mike Rosulek
@article{DBLP:journals/popets/DavisPRS23, author = {Hannah Davis and Christopher Patton and Mike Rosulek and Phillipp Schoppmann}, title = {Verifiable Distributed Aggregation Functions}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {4}, pages = {578--592}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0126}, doi = {10.56553/POPETS-2023-0126}, timestamp = {Thu, 17 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DavisPRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GarimellaRS23, author = {Gayathri Garimella and Mike Rosulek and Jaspal Singh}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Malicious Secure, Structure-Aware Private Set Intersection}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {577--610}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_19}, doi = {10.1007/978-3-031-38557-5\_19}, timestamp = {Mon, 14 Aug 2023 16:16:25 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GarimellaRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ctrsa/2023, editor = {Mike Rosulek}, title = {Topics in Cryptology - {CT-RSA} 2023 - Cryptographers' Track at the {RSA} Conference 2023, San Francisco, CA, USA, April 24-27, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13871}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30872-7}, doi = {10.1007/978-3-031-30872-7}, isbn = {978-3-031-30871-0}, timestamp = {Sat, 22 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavisPRS23, author = {Hannah Davis and Christopher Patton and Mike Rosulek and Phillipp Schoppmann}, title = {Verifiable Distributed Aggregation Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {130}, year = {2023}, url = {https://eprint.iacr.org/2023/130}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DavisPRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarimellaRS23, author = {Gayathri Garimella and Mike Rosulek and Jaspal Singh}, title = {Malicious Secure, Structure-Aware Private Set Intersection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1166}, year = {2023}, url = {https://eprint.iacr.org/2023/1166}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarimellaRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GarimellaRS22, author = {Gayathri Garimella and Mike Rosulek and Jaspal Singh}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Structure-Aware Private Set Intersection, with Applications to Fuzzy Matching}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {323--352}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_12}, doi = {10.1007/978-3-031-15802-5\_12}, timestamp = {Wed, 19 Oct 2022 17:37:44 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GarimellaRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HollenbergRR22, author = {Tommy Hollenberg and Mike Rosulek and Lawrence Roy}, title = {A Complete Characterization of Security for Linicrypt Block Cipher Modes}, booktitle = {35th {IEEE} Computer Security Foundations Symposium, {CSF} 2022, Haifa, Israel, August 7-10, 2022}, pages = {439--454}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CSF54842.2022.9919676}, doi = {10.1109/CSF54842.2022.9919676}, timestamp = {Fri, 11 Nov 2022 16:53:14 +0100}, biburl = {https://dblp.org/rec/conf/csfw/HollenbergRR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BeauregardXR22, author = {Tyler Beauregard and Janabel Xia and Mike Rosulek}, editor = {Clemente Galdi and Stanislaw Jarecki}, title = {Finding One Common Item, Privately}, booktitle = {Security and Cryptography for Networks - 13th International Conference, {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13409}, pages = {462--480}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-14791-3\_20}, doi = {10.1007/978-3-031-14791-3\_20}, timestamp = {Wed, 07 Sep 2022 17:42:21 +0200}, biburl = {https://dblp.org/rec/conf/scn/BeauregardXR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/McQuoidRX22, author = {Ian McQuoid and Mike Rosulek and Jiayu Xu}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {How to Obfuscate {MPC} Inputs}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13748}, pages = {151--180}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22365-5\_6}, doi = {10.1007/978-3-031-22365-5\_6}, timestamp = {Fri, 23 Dec 2022 17:47:38 +0100}, biburl = {https://dblp.org/rec/conf/tcc/McQuoidRX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RoyLJR22, author = {Lawrence Roy and Stanislav Lyakhov and Yeongjin Jang and Mike Rosulek}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {Practical Privacy-Preserving Authentication for {SSH}}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {3345--3362}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/roy}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/RoyLJR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeauregardXR22, author = {Tyler Beauregard and Janabel Xia and Mike Rosulek}, title = {Finding One Common Item, Privately}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {573}, year = {2022}, url = {https://eprint.iacr.org/2022/573}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeauregardXR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RoyLJR22, author = {Lawrence Roy and Stanislav Lyakhov and Yeongjin Jang and Mike Rosulek}, title = {Practical Privacy-Preserving Authentication for {SSH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {740}, year = {2022}, url = {https://eprint.iacr.org/2022/740}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RoyLJR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarimellaRS22, author = {Gayathri Garimella and Mike Rosulek and Jaspal Singh}, title = {Structure-Aware Private Set Intersection, With Applications to Fuzzy Matching}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1011}, year = {2022}, url = {https://eprint.iacr.org/2022/1011}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarimellaRS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HollenbergRR22, author = {Tommy Hollenberg and Mike Rosulek and Lawrence Roy}, title = {A Complete Characterization of Security for Linicrypt Block Cipher Modes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1033}, year = {2022}, url = {https://eprint.iacr.org/2022/1033}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HollenbergRR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McQuoidRX22, author = {Ian McQuoid and Mike Rosulek and Jiayu Xu}, title = {How to Obfuscate {MPC} Inputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1463}, year = {2022}, url = {https://eprint.iacr.org/2022/1463}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/McQuoidRX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/RajabiBRWF21, author = {Arezoo Rajabi and Rakesh B. Bobba and Mike Rosulek and Charles V. Wright and Wu{-}chi Feng}, title = {On the (Im)Practicality of Adversarial Perturbation for Image Privacy}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2021}, number = {1}, pages = {85--106}, year = {2021}, url = {https://doi.org/10.2478/popets-2021-0006}, doi = {10.2478/POPETS-2021-0006}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/RajabiBRWF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/McQuoidRR21, author = {Ian McQuoid and Mike Rosulek and Lawrence Roy}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Batching Base Oblivious Transfers}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13092}, pages = {281--310}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92078-4\_10}, doi = {10.1007/978-3-030-92078-4\_10}, timestamp = {Fri, 03 Dec 2021 17:36:40 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/McQuoidRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RosulekT21, author = {Mike Rosulek and Ni Trieu}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Compact and Malicious Private Set Intersection for Small Sets}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1166--1181}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484778}, doi = {10.1145/3460120.3484778}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RosulekT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/RosulekR21, author = {Mike Rosulek and Lawrence Roy}, editor = {Tal Malkin and Chris Peikert}, title = {Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12825}, pages = {94--124}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84242-0\_5}, doi = {10.1007/978-3-030-84242-0\_5}, timestamp = {Mon, 16 Aug 2021 09:08:14 +0200}, biburl = {https://dblp.org/rec/conf/crypto/RosulekR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GarimellaPRTY21, author = {Gayathri Garimella and Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai}, editor = {Tal Malkin and Chris Peikert}, title = {Oblivious Key-Value Stores and Amplification for Private Set Intersection}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12826}, pages = {395--425}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84245-1\_14}, doi = {10.1007/978-3-030-84245-1\_14}, timestamp = {Mon, 16 Aug 2021 09:08:14 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GarimellaPRTY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GarimellaMRSS21, author = {Gayathri Garimella and Payman Mohassel and Mike Rosulek and Saeed Sadeghian and Jaspal Singh}, editor = {Juan A. Garay}, title = {Private Set Operations from Oblivious Switching}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {591--617}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_21}, doi = {10.1007/978-3-030-75248-4\_21}, timestamp = {Fri, 07 May 2021 15:40:46 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GarimellaMRSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarimellaMRSS21, author = {Gayathri Garimella and Payman Mohassel and Mike Rosulek and Seyed Saeed Sadeghian and Jaspal Singh}, title = {Private Set Operations from Oblivious Switching}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {243}, year = {2021}, url = {https://eprint.iacr.org/2021/243}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarimellaMRSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McQuoidRR21, author = {Ian McQuoid and Mike Rosulek and Lawrence Roy}, title = {Batching Base Oblivious Transfers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {682}, year = {2021}, url = {https://eprint.iacr.org/2021/682}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McQuoidRR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RosulekR21, author = {Mike Rosulek and Lawrence Roy}, title = {Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {749}, year = {2021}, url = {https://eprint.iacr.org/2021/749}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RosulekR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GarimellaPRTY21, author = {Gayathri Garimella and Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai}, title = {Oblivious Key-Value Stores and Amplification for Private Set Intersection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {883}, year = {2021}, url = {https://eprint.iacr.org/2021/883}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GarimellaPRTY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RosulekT21, author = {Mike Rosulek and Ni Trieu}, title = {Compact and Malicious Private Set Intersection for Small Sets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1159}, year = {2021}, url = {https://eprint.iacr.org/2021/1159}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RosulekT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/MohasselRT20, author = {Payman Mohassel and Mike Rosulek and Ni Trieu}, title = {Practical Privacy-Preserving K-means Clustering}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2020}, number = {4}, pages = {414--433}, year = {2020}, url = {https://doi.org/10.2478/popets-2020-0080}, doi = {10.2478/POPETS-2020-0080}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/MohasselRT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/McQuoidRR20, author = {Ian McQuoid and Mike Rosulek and Lawrence Roy}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Minimal Symmetric {PAKE} and 1-out-of-N {OT} from Programmable-Once Public Functions}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {425--442}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417870}, doi = {10.1145/3372297.3417870}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/McQuoidRR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MohasselRR20, author = {Payman Mohassel and Peter Rindal and Mike Rosulek}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Fast Database Joins and {PSI} for Secret Shared Data}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1271--1287}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3423358}, doi = {10.1145/3372297.3423358}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MohasselRR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PinkasRTY20, author = {Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai}, editor = {Anne Canteaut and Yuval Ishai}, title = {{PSI} from PaXoS: Fast, Malicious Private Set Intersection}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {739--767}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_25}, doi = {10.1007/978-3-030-45724-2\_25}, timestamp = {Mon, 04 May 2020 14:32:28 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PinkasRTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PinkasRTY20, author = {Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai}, title = {{PSI} from PaXoS: Fast, Malicious Private Set Intersection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {193}, year = {2020}, url = {https://eprint.iacr.org/2020/193}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PinkasRTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McQuoidRR20, author = {Ian McQuoid and Mike Rosulek and Lawrence Roy}, title = {Minimal Symmetric {PAKE} and 1-out-of-N {OT} from Programmable-Once Public Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1043}, year = {2020}, url = {https://eprint.iacr.org/2020/1043}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McQuoidRR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/GroceRR19, author = {Adam Groce and Peter Rindal and Mike Rosulek}, title = {Cheaper Private Set Intersection via Differentially Private Leakage}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2019}, number = {3}, pages = {6--25}, year = {2019}, url = {https://doi.org/10.2478/popets-2019-0034}, doi = {10.2478/POPETS-2019-0034}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/GroceRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KolesnikovRT019, author = {Vladimir Kolesnikov and Mike Rosulek and Ni Trieu and Xiao Wang}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Scalable Private Set Union from Symmetric-Key Techniques}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11922}, pages = {636--666}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34621-8\_23}, doi = {10.1007/978-3-030-34621-8\_23}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KolesnikovRT019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Gilad-BachrachL19, author = {Ran Gilad{-}Bachrach and Kim Laine and Kristin E. Lauter and Peter Rindal and Mike Rosulek}, editor = {Radu Sion and Charalampos Papamanthou}, title = {Secure Data Exchange: {A} Marketplace in the Cloud}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Cloud Computing Security Workshop, CCSW@CCS 2019, London, UK, November 11, 2019}, pages = {117--128}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338466.3358924}, doi = {10.1145/3338466.3358924}, timestamp = {Thu, 12 Oct 2023 12:32:09 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Gilad-BachrachL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PinkasRTY19, author = {Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {SpOT-Light: Lightweight Private Set Intersection from Sparse {OT} Extension}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {401--431}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_13}, doi = {10.1007/978-3-030-26954-8\_13}, timestamp = {Fri, 09 Aug 2019 14:27:02 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PinkasRTY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/TajikGDEBRWF19, author = {Kimia Tajik and Akshith Gunasekaran and Rhea Dutta and Brandon Ellis and Rakesh B. Bobba and Mike Rosulek and Charles V. Wright and Wu{-}chi Feng}, title = {Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption}, booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS} 2019, San Diego, California, USA, February 24-27, 2019}, publisher = {The Internet Society}, year = {2019}, url = {https://www.ndss-symposium.org/ndss-paper/balancing-image-privacy-and-usability-with-thumbnail-preserving-encryption/}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ndss/TajikGDEBRWF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/McQuoidSR19, author = {Ian McQuoid and Trevor Swope and Mike Rosulek}, editor = {Dennis Hofheinz and Alon Rosen}, title = {Characterizing Collision and Second-Preimage Resistance in Linicrypt}, booktitle = {Theory of Cryptography - 17th International Conference, {TCC} 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11891}, pages = {451--470}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36030-6\_18}, doi = {10.1007/978-3-030-36030-6\_18}, timestamp = {Mon, 25 Nov 2019 13:58:16 +0100}, biburl = {https://dblp.org/rec/conf/tcc/McQuoidSR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GroceRR19, author = {Adam Groce and Peter Rindal and Mike Rosulek}, title = {Cheaper Private Set Intersection via Differentially Private Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {239}, year = {2019}, url = {https://eprint.iacr.org/2019/239}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GroceRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TajikGDEBRWF19, author = {Kimia Tajik and Akshith Gunasekaran and Rhea Dutta and Brandon Ellis and Rakesh B. Bobba and Mike Rosulek and Charles V. Wright and Wu{-}chi Feng}, title = {Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {295}, year = {2019}, url = {https://eprint.iacr.org/2019/295}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TajikGDEBRWF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallCMRS19, author = {Marshall Ball and Brent Carmer and Tal Malkin and Mike Rosulek and Nichole Schimanski}, title = {Garbled Neural Networks are Practical}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2019}, url = {https://eprint.iacr.org/2019/338}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallCMRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohasselRR19, author = {Payman Mohassel and Peter Rindal and Mike Rosulek}, title = {Fast Database Joins for Secret Shared Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {518}, year = {2019}, url = {https://eprint.iacr.org/2019/518}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MohasselRR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PinkasRTY19, author = {Benny Pinkas and Mike Rosulek and Ni Trieu and Avishay Yanai}, title = {SpOT-Light: Lightweight Private Set Intersection from Sparse {OT} Extension}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {634}, year = {2019}, url = {https://eprint.iacr.org/2019/634}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PinkasRTY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolesnikovRTW19, author = {Vladimir Kolesnikov and Mike Rosulek and Ni Trieu and Xiao Wang}, title = {Scalable Private Set Union from Symmetric-Key Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {776}, year = {2019}, url = {https://eprint.iacr.org/2019/776}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolesnikovRTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohasselRT19, author = {Payman Mohassel and Mike Rosulek and Ni Trieu}, title = {Practical Privacy-Preserving K-means Clustering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1158}, year = {2019}, url = {https://eprint.iacr.org/2019/1158}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MohasselRT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftsec/EvansKR18, author = {David Evans and Vladimir Kolesnikov and Mike Rosulek}, title = {A Pragmatic Introduction to Secure Multi-Party Computation}, journal = {Found. Trends Priv. Secur.}, volume = {2}, number = {2-3}, pages = {70--246}, year = {2018}, url = {https://doi.org/10.1561/3300000019}, doi = {10.1561/3300000019}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ftsec/EvansKR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/DemmlerRRT18, author = {Daniel Demmler and Peter Rindal and Mike Rosulek and Ni Trieu}, title = {{PIR-PSI:} Scaling Private Contact Discovery}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2018}, number = {4}, pages = {159--178}, year = {2018}, url = {https://doi.org/10.1515/popets-2018-0037}, doi = {10.1515/POPETS-2018-0037}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/DemmlerRRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BehniaOYR18, author = {Rouzbeh Behnia and Muslum Ozgur Ozmen and Attila A. Yavuz and Mike Rosulek}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {{TACHYON:} Fast Signatures from Compact Knapsack}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1855--1867}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243819}, doi = {10.1145/3243734.3243819}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BehniaOYR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KatzRR018, author = {Jonathan Katz and Samuel Ranellucci and Mike Rosulek and Xiao Wang}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Optimizing Authenticated Garbling for Faster Secure Two-Party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {365--391}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_13}, doi = {10.1007/978-3-319-96878-0\_13}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KatzRR018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KolesnikovRT18, author = {Vladimir Kolesnikov and Mike Rosulek and Ni Trieu}, editor = {Sarah Meiklejohn and Kazue Sako}, title = {SWiM: Secure Wildcard Pattern Matching from {OT} Extension}, booktitle = {Financial Cryptography and Data Security - 22nd International Conference, {FC} 2018, Nieuwpoort, Cura{\c{c}}ao, February 26 - March 2, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10957}, pages = {222--240}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-662-58387-6\_12}, doi = {10.1007/978-3-662-58387-6\_12}, timestamp = {Fri, 30 Aug 2019 11:17:01 +0200}, biburl = {https://dblp.org/rec/conf/fc/KolesnikovRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/RosulekS18, author = {Mike Rosulek and Morgan Shirley}, editor = {Amos Beimel and Stefan Dziembowski}, title = {On the Structure of Unconditional {UC} Hybrid Protocols}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11240}, pages = {98--126}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03810-6\_4}, doi = {10.1007/978-3-030-03810-6\_4}, timestamp = {Sat, 09 Apr 2022 12:44:08 +0200}, biburl = {https://dblp.org/rec/conf/tcc/RosulekS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/McQuoidSR18, author = {Ian McQuoid and Trevor Swope and Mike Rosulek}, title = {Characterizing Collision and Second-Preimage Resistance in Linicrypt}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {458}, year = {2018}, url = {https://eprint.iacr.org/2018/458}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/McQuoidSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatzRRW18, author = {Jonathan Katz and Samuel Ranellucci and Mike Rosulek and Xiao Wang}, title = {Optimizing Authenticated Garbling for Faster Secure Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {578}, year = {2018}, url = {https://eprint.iacr.org/2018/578}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatzRRW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DemmlerRRT18, author = {Daniel Demmler and Peter Rindal and Mike Rosulek and Ni Trieu}, title = {{PIR-PSI:} Scaling Private Contact Discovery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {579}, year = {2018}, url = {https://eprint.iacr.org/2018/579}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DemmlerRRT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BehniaOYR18, author = {Rouzbeh Behnia and Muslum Ozgur Ozmen and Attila A. Yavuz and Mike Rosulek}, title = {{TACHYON:} Fast Signatures from Compact Knapsack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {873}, year = {2018}, url = {https://eprint.iacr.org/2018/873}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BehniaOYR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/PrabhakaranR17, author = {Manoj Prabhakaran and Mike Rosulek}, title = {Reconciling Non-malleability with Homomorphic Encryption}, journal = {J. Cryptol.}, volume = {30}, number = {3}, pages = {601--671}, year = {2017}, url = {https://doi.org/10.1007/s00145-016-9231-y}, doi = {10.1007/S00145-016-9231-Y}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/PrabhakaranR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KolesnikovNRTT17, author = {Vladimir Kolesnikov and Jesper Buus Nielsen and Mike Rosulek and Ni Trieu and Roberto Trifiletti}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{DUPLO:} Unifying Cut-and-Choose for Garbled Circuits}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {3--20}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3133991}, doi = {10.1145/3133956.3133991}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/KolesnikovNRTT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MarohnWFRB17, author = {Byron Marohn and Charles V. Wright and Wu{-}chi Feng and Mike Rosulek and Rakesh B. Bobba}, editor = {Roger A. Hallman and Kurt Rohloff and Victor I. Chang}, title = {Approximate Thumbnail Preserving Encryption}, booktitle = {Proceedings of the 2017 on Multimedia Privacy and Security, MPS@CCS 2017, Dallas, TX, USA, October 30, 2017}, pages = {33--43}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3137616.3137621}, doi = {10.1145/3137616.3137621}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MarohnWFRB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RindalR17, author = {Peter Rindal and Mike Rosulek}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Malicious-Secure Private Set Intersection via Dual Execution}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1229--1242}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134044}, doi = {10.1145/3133956.3134044}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RindalR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KolesnikovMPRT17, author = {Vladimir Kolesnikov and Naor Matania and Benny Pinkas and Mike Rosulek and Ni Trieu}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Practical Multi-party Private Set Intersection from Symmetric-Key Techniques}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {1257--1272}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134065}, doi = {10.1145/3133956.3134065}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KolesnikovMPRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/RindalR17, author = {Peter Rindal and Mike Rosulek}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Improved Private Set Intersection Against Malicious Adversaries}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {235--259}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_9}, doi = {10.1007/978-3-319-56620-7\_9}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/RindalR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MohasselR17, author = {Payman Mohassel and Mike Rosulek}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Non-interactive Secure 2PC in the Offline/Online and Batch Settings}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10212}, pages = {425--455}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56617-7\_15}, doi = {10.1007/978-3-319-56617-7\_15}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MohasselR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MohasselRS17, author = {Payman Mohassel and Mike Rosulek and Alessandra Scafuro}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Sublinear Zero-Knowledge Arguments for {RAM} Programs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {501--531}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_18}, doi = {10.1007/978-3-319-56620-7\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MohasselRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Rosulek17, author = {Mike Rosulek}, editor = {Arpita Patra and Nigel P. Smart}, title = {Improvements for Gate-Hiding Garbled Circuits}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2017 - 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10698}, pages = {325--345}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-71667-1\_17}, doi = {10.1007/978-3-319-71667-1\_17}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Rosulek17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AfsharMR17, author = {Arash Afshar and Payman Mohassel and Mike Rosulek}, title = {Efficient Maliciously Secure Two Party Computation for Mixed Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {62}, year = {2017}, url = {http://eprint.iacr.org/2017/062}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AfsharMR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohasselR17, author = {Payman Mohassel and Mike Rosulek}, title = {Non-Interactive Secure 2PC in the Offline/Online and Batch Settings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {125}, year = {2017}, url = {http://eprint.iacr.org/2017/125}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MohasselR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohasselRS17, author = {Payman Mohassel and Mike Rosulek and Alessandra Scafuro}, title = {Sublinear Zero-Knowledge Arguments for {RAM} Programs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {129}, year = {2017}, url = {http://eprint.iacr.org/2017/129}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MohasselRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolesnikovNRTT17, author = {Vladimir Kolesnikov and Jesper Buus Nielsen and Mike Rosulek and Ni Trieu and Roberto Trifiletti}, title = {{DUPLO:} Unifying Cut-and-Choose for Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {344}, year = {2017}, url = {http://eprint.iacr.org/2017/344}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolesnikovNRTT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RosulekS17, author = {Mike Rosulek and Morgan Shirley}, title = {On the Structure of Unconditional {UC} Hybrid Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {464}, year = {2017}, url = {http://eprint.iacr.org/2017/464}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RosulekS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RindalR17, author = {Peter Rindal and Mike Rosulek}, title = {Malicious-Secure Private Set Intersection via Dual Execution}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {769}, year = {2017}, url = {http://eprint.iacr.org/2017/769}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RindalR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolesnikovMPRT17, author = {Vladimir Kolesnikov and Naor Matania and Benny Pinkas and Mike Rosulek and Ni Trieu}, title = {Practical Multi-party Private Set Intersection from Symmetric-Key Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {799}, year = {2017}, url = {http://eprint.iacr.org/2017/799}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolesnikovMPRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rosulek17, author = {Mike Rosulek}, title = {Improvements for Gate-Hiding Garbled Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {976}, year = {2017}, url = {http://eprint.iacr.org/2017/976}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rosulek17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MarohnWFRB17, author = {Byron Marohn and Charles V. Wright and Wu{-}chi Feng and Mike Rosulek and Rakesh B. Bobba}, title = {Approximate Thumbnail Preserving Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1046}, year = {2017}, url = {http://eprint.iacr.org/2017/1046}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MarohnWFRB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolesnikovRT17, author = {Vladimir Kolesnikov and Mike Rosulek and Ni Trieu}, title = {SWiM: Secure Wildcard Pattern Matching From {OT} Extension}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1150}, year = {2017}, url = {http://eprint.iacr.org/2017/1150}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolesnikovRT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BallMR16, author = {Marshall Ball and Tal Malkin and Mike Rosulek}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Garbling Gadgets for Boolean and Arithmetic Circuits}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {565--577}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978410}, doi = {10.1145/2976749.2978410}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BallMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KolesnikovKRT16, author = {Vladimir Kolesnikov and Ranjit Kumaresan and Mike Rosulek and Ni Trieu}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {Efficient Batched Oblivious {PRF} with Applications to Private Set Intersection}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {818--829}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2978381}, doi = {10.1145/2976749.2978381}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KolesnikovKRT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CarmerR16, author = {Brent Carmer and Mike Rosulek}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Linicrypt: {A} Model for Practical Cryptography}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {416--445}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_15}, doi = {10.1007/978-3-662-53015-3\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CarmerR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RindalR16, author = {Peter Rindal and Mike Rosulek}, editor = {Thorsten Holz and Stefan Savage}, title = {Faster Malicious 2-Party Secure Computation with Online/Offline Dual Execution}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {297--314}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/rindal}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/RindalR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CarmerR16, author = {Brent Carmer and Mike Rosulek}, title = {Linicrypt: {A} Model for Practical Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {548}, year = {2016}, url = {http://eprint.iacr.org/2016/548}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CarmerR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Gilad-BachrachL16, author = {Ran Gilad{-}Bachrach and Kim Laine and Kristin E. Lauter and Peter Rindal and Mike Rosulek}, title = {Secure Data Exchange: {A} Marketplace in the Cloud}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {620}, year = {2016}, url = {http://eprint.iacr.org/2016/620}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Gilad-BachrachL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RindalR16, author = {Peter Rindal and Mike Rosulek}, title = {Faster Malicious 2-party Secure Computation with Online/Ofine Dual Execution}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {632}, year = {2016}, url = {http://eprint.iacr.org/2016/632}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RindalR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RindalR16a, author = {Peter Rindal and Mike Rosulek}, title = {Improved Private Set Intersection against Malicious Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {746}, year = {2016}, url = {http://eprint.iacr.org/2016/746}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RindalR16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolesnikovKRT16, author = {Vladimir Kolesnikov and Ranjit Kumaresan and Mike Rosulek and Ni Trieu}, title = {Efficient Batched Oblivious {PRF} with Applications to Private Set Intersection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {799}, year = {2016}, url = {http://eprint.iacr.org/2016/799}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolesnikovKRT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BallMR16, author = {Marshall Ball and Tal Malkin and Mike Rosulek}, title = {Garbling Gadgets for Boolean and Arithmetic Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {969}, year = {2016}, url = {http://eprint.iacr.org/2016/969}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BallMR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Rosulek15, author = {Mike Rosulek}, title = {Secure Your Data and Compute on It, Too}, journal = {{XRDS}}, volume = {21}, number = {3}, pages = {36--41}, year = {2015}, url = {https://doi.org/10.1145/2730910}, doi = {10.1145/2730910}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Rosulek15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MohasselRZ15, author = {Payman Mohassel and Mike Rosulek and Ye Zhang}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {Fast and Secure Three-party Computation: The Garbled Circuit Approach}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {591--602}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2813705}, doi = {10.1145/2810103.2813705}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MohasselRZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HuMR15, author = {Zhangxiang Hu and Payman Mohassel and Mike Rosulek}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Efficient Zero-Knowledge Proofs of Non-algebraic Statements with Sublinear Amortized Cost}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {150--169}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_8}, doi = {10.1007/978-3-662-48000-7\_8}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HuMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ZahurRE15, author = {Samee Zahur and Mike Rosulek and David Evans}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {220--250}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_8}, doi = {10.1007/978-3-662-46803-6\_8}, timestamp = {Thu, 14 Oct 2021 09:58:15 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ZahurRE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AfsharHMR15, author = {Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {How to Efficiently Evaluate {RAM} Programs with Malicious Security}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {702--729}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_27}, doi = {10.1007/978-3-662-46800-5\_27}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AfsharHMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fie/CarmerR15, author = {Brent Carmer and Mike Rosulek}, title = {Vamonos: Embeddable visualizations of advanced algorithms}, booktitle = {2015 {IEEE} Frontiers in Education Conference, {FIE} 2015, El Paso, TX, USA, October 21-24, 2015}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/FIE.2015.7344263}, doi = {10.1109/FIE.2015.7344263}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fie/CarmerR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KolesnikovMRR15, author = {Vladimir Kolesnikov and Payman Mohassel and Ben Riva and Mike Rosulek}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Richer Efficiency/Security Trade-offs in 2PC}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {229--259}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_11}, doi = {10.1007/978-3-662-46494-6\_11}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KolesnikovMRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolesnikovMRR15, author = {Vladimir Kolesnikov and Payman Mohassel and Ben Riva and Mike Rosulek}, title = {Richer Efficiency/Security Trade-offs in 2PC}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {55}, year = {2015}, url = {http://eprint.iacr.org/2015/055}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolesnikovMRR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuMR15, author = {Zhangxiang Hu and Payman Mohassel and Mike Rosulek}, title = {Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {497}, year = {2015}, url = {http://eprint.iacr.org/2015/497}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HuMR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MohasselRZ15, author = {Payman Mohassel and Mike Rosulek and Ye Zhang}, title = {Fast and Secure Three-party Computation: The Garbled Circuit Approach}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {931}, year = {2015}, url = {http://eprint.iacr.org/2015/931}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MohasselRZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KolesnikovMR14, author = {Vladimir Kolesnikov and Payman Mohassel and Mike Rosulek}, editor = {Juan A. Garay and Rosario Gennaro}, title = {FleXOR: Flexible Garbling for {XOR} Gates That Beats Free-XOR}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {440--457}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_25}, doi = {10.1007/978-3-662-44381-1\_25}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KolesnikovMR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KolesnikovMR14, author = {Vladimir Kolesnikov and Payman Mohassel and Mike Rosulek}, title = {FleXOR: Flexible garbling for {XOR} gates that beats free-XOR}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {460}, year = {2014}, url = {http://eprint.iacr.org/2014/460}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KolesnikovMR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZahurRE14, author = {Samee Zahur and Mike Rosulek and David Evans}, title = {Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {756}, year = {2014}, url = {http://eprint.iacr.org/2014/756}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZahurRE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AfsharHMR14, author = {Arash Afshar and Zhangxiang Hu and Payman Mohassel and Mike Rosulek}, title = {How to Efficiently Evaluate {RAM} Programs with Malicious Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {759}, year = {2014}, url = {http://eprint.iacr.org/2014/759}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AfsharHMR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GordonMRW13, author = {S. Dov Gordon and Tal Malkin and Mike Rosulek and Hoeteck Wee}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {Multi-party Computation of Polynomials and Branching Programs without Simultaneous Interaction}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {575--591}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_34}, doi = {10.1007/978-3-642-38348-9\_34}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GordonMRW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/JeffsR13, author = {R. Amzi Jeffs and Mike Rosulek}, editor = {Amit Sahai}, title = {Characterizing the Cryptographic Properties of Reactive 2-Party Functionalities}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {263--280}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_15}, doi = {10.1007/978-3-642-36594-2\_15}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/JeffsR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ciss/MajiPR13, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, editor = {Manoj Prabhakaran and Amit Sahai}, title = {Complexity of Multi-Party Computation Functionalities}, booktitle = {Secure Multi-Party Computation}, series = {Cryptology and Information Security Series}, volume = {10}, pages = {249--283}, publisher = {{IOS} Press}, year = {2013}, url = {https://doi.org/10.3233/978-1-61499-169-4-249}, doi = {10.3233/978-1-61499-169-4-249}, timestamp = {Wed, 17 Apr 2024 21:39:22 +0200}, biburl = {https://dblp.org/rec/series/ciss/MajiPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MajiPR13, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, title = {Complexity of Multi-Party Computation Functionalities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2013}, url = {http://eprint.iacr.org/2013/042}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MajiPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GordonMRW13, author = {S. Dov Gordon and Tal Malkin and Mike Rosulek and Hoeteck Wee}, title = {Multi-Party Computation of Polynomials and Branching Programs without Simultaneous Interaction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2013}, url = {http://eprint.iacr.org/2013/267}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GordonMRW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Rosulek12, author = {Mike Rosulek}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Must You Know the Code of f to Securely Compute f?}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {87--104}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_7}, doi = {10.1007/978-3-642-32009-5\_7}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Rosulek12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Rosulek12a, author = {Mike Rosulek}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Universal Composability from Essentially Any Trusted Setup}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {406--423}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_24}, doi = {10.1007/978-3-642-32009-5\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Rosulek12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/MajiPR12, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, editor = {Steven D. Galbraith and Mridul Nandi}, title = {A Unified Characterization of Completeness and Triviality for Secure Function Evaluation}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, pages = {40--59}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7\_4}, doi = {10.1007/978-3-642-34931-7\_4}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/MajiPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rosulek12, author = {Mike Rosulek}, title = {Must you know the code of f to securely compute f?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {455}, year = {2012}, url = {http://eprint.iacr.org/2012/455}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rosulek12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MajiPR11, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, editor = {Aggelos Kiayias}, title = {Attribute-Based Signatures}, booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6558}, pages = {376--392}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19074-2\_24}, doi = {10.1007/978-3-642-19074-2\_24}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/MajiPR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MajiOPR11, author = {Hemanta K. Maji and Pichayoot Ouppaphan and Manoj Prabhakaran and Mike Rosulek}, editor = {Yuval Ishai}, title = {Exploring the Limits of Common Coins Using Frontier Analysis of Protocols}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {486--503}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_29}, doi = {10.1007/978-3-642-19571-6\_29}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MajiOPR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MajiOPR11, author = {Hemanta K. Maji and Pichayoot Ouppaphan and Manoj Prabhakaran and Mike Rosulek}, title = {Exploring the Limits of Common Coins Using Frontier Analysis of Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {6}, year = {2011}, url = {http://eprint.iacr.org/2011/006}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MajiOPR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rosulek11, author = {Mike Rosulek}, title = {Universal Composability from Essentially Any Trusted Setup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {240}, year = {2011}, url = {http://eprint.iacr.org/2011/240}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rosulek11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MajiPR10, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, editor = {Tal Rabin}, title = {A Zero-One Law for Cryptographic Complexity with Respect to Computational {UC} Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {595--612}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_32}, doi = {10.1007/978-3-642-14623-7\_32}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MajiPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/MajiPR10, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, editor = {Andrew Chi{-}Chih Yao}, title = {Cryptographic Complexity Classes and Computational Intractability Assumptions}, booktitle = {Innovations in Computer Science - {ICS} 2010, Tsinghua University, Beijing, China, January 5-7, 2010. Proceedings}, pages = {266--289}, publisher = {Tsinghua University Press}, year = {2010}, url = {http://conference.iiis.tsinghua.edu.cn/ICS2010/content/papers/22.html}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/innovations/MajiPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MajiPR10, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, title = {A Zero-One Law for Deterministic 2-Party Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {98}, year = {2010}, url = {http://eprint.iacr.org/2010/098}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MajiPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MajiPR10a, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, title = {Attribute-Based Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {595}, year = {2010}, url = {http://eprint.iacr.org/2010/595}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MajiPR10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Rosulek09, author = {Michael J. Rosulek}, title = {The Structure of Secure Multi-Party Computation}, school = {University of Illinois Urbana-Champaign, {USA}}, year = {2009}, url = {https://hdl.handle.net/2142/13698}, timestamp = {Fri, 13 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Rosulek09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MajiPR09, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, editor = {Omer Reingold}, title = {Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation}, booktitle = {Theory of Cryptography, 6th Theory of Cryptography Conference, {TCC} 2009, San Francisco, CA, USA, March 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5444}, pages = {256--273}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00457-5\_16}, doi = {10.1007/978-3-642-00457-5\_16}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MajiPR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/MajiPR09, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, title = {Cryptographic Complexity Classes and Computational Intractability Assumptions}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR09-123}}, year = {2009}, url = {https://eccc.weizmann.ac.il/report/2009/123}, eprinttype = {ECCC}, eprint = {TR09-123}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/MajiPR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PrabhakaranR08, author = {Manoj Prabhakaran and Mike Rosulek}, editor = {Josef Pieprzyk}, title = {Towards Robust Computation on Encrypted Data}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {216--233}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_14}, doi = {10.1007/978-3-540-89255-7\_14}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PrabhakaranR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PrabhakaranR08, author = {Manoj Prabhakaran and Mike Rosulek}, editor = {David A. Wagner}, title = {Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {262--279}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_15}, doi = {10.1007/978-3-540-85174-5\_15}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PrabhakaranR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/PrabhakaranR08, author = {Manoj Prabhakaran and Mike Rosulek}, editor = {Luca Aceto and Ivan Damg{\aa}rd and Leslie Ann Goldberg and Magn{\'{u}}s M. Halld{\'{o}}rsson and Anna Ing{\'{o}}lfsd{\'{o}}ttir and Igor Walukiewicz}, title = {Homomorphic Encryption with {CCA} Security}, booktitle = {Automata, Languages and Programming, 35th International Colloquium, {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&} Track {C:} Security and Cryptography Foundations}, series = {Lecture Notes in Computer Science}, volume = {5126}, pages = {667--678}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70583-3\_54}, doi = {10.1007/978-3-540-70583-3\_54}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/PrabhakaranR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/PrabhakaranR08, author = {Manoj Prabhakaran and Mike Rosulek}, title = {Cryptographic Complexity of Multi-party Computation Problems: Classifications and Separations}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR08-050}}, year = {2008}, url = {https://eccc.weizmann.ac.il/eccc-reports/2008/TR08-050/index.html}, eprinttype = {ECCC}, eprint = {TR08-050}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/PrabhakaranR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PrabhakaranR08, author = {Manoj Prabhakaran and Mike Rosulek}, title = {Homomorphic Encryption with {CCA} Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {79}, year = {2008}, url = {http://eprint.iacr.org/2008/079}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PrabhakaranR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MajiPR08, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, title = {Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {328}, year = {2008}, url = {http://eprint.iacr.org/2008/328}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MajiPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MajiPR08a, author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek}, title = {Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {454}, year = {2008}, url = {http://eprint.iacr.org/2008/454}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MajiPR08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/PrabhakaranR07, author = {Manoj Prabhakaran and Mike Rosulek}, editor = {Alfred Menezes}, title = {Rerandomizable {RCCA} Encryption}, booktitle = {Advances in Cryptology - {CRYPTO} 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4622}, pages = {517--534}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74143-5\_29}, doi = {10.1007/978-3-540-74143-5\_29}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/PrabhakaranR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/OlsonRW07, author = {Lars E. Olson and Michael J. Rosulek and Marianne Winslett}, editor = {Peng Ning and Ting Yu}, title = {Harvesting credentials in trust negotiation as an honest-but-curious adversary}, booktitle = {Proceedings of the 2007 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2007, Alexandria, VA, USA, October 29, 2007}, pages = {64--67}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314333.1314345}, doi = {10.1145/1314333.1314345}, timestamp = {Mon, 04 Apr 2022 16:00:14 +0200}, biburl = {https://dblp.org/rec/conf/wpes/OlsonRW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PrabhakaranR07, author = {Manoj Prabhakaran and Mike Rosulek}, title = {Rerandomizable {RCCA} Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {119}, year = {2007}, url = {http://eprint.iacr.org/2007/119}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PrabhakaranR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.