On the hardness of learning with rounding over small modulus A Bogdanov, S Guo, D Masny, S Richelson, A Rosen Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2015 | 119 | 2015 |

Textbook non-malleable commitments V Goyal, O Pandey, S Richelson Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016 | 109 | 2016 |

Chosen-ciphertext secure fully homomorphic encryption R Canetti, S Raghuraman, S Richelson, V Vaikuntanathan Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017 | 76 | 2017 |

An algebraic approach to non-malleability V Goyal, S Richelson, A Rosen, M Vald 2014 IEEE 55th Annual Symposium on Foundations of Computer Science, 41-50, 2014 | 56 | 2014 |

Round-optimal black-box two-party computation R Ostrovsky, S Richelson, A Scafuro Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015 | 50 | 2015 |

Towards doubly efficient private information retrieval R Canetti, J Holmgren, S Richelson Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017 | 46 | 2017 |

Topology-hiding computation T Moran, I Orlov, S Richelson Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015 | 29 | 2015 |

Non-malleable commitments using Goldreich-Levin list decoding V Goyal, S Richelson 2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS …, 2019 | 19 | 2019 |

Fast non-malleable commitments H Brenner, V Goyal, S Richelson, A Rosen, M Vald Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 16 | 2015 |

How to subvert backdoored encryption: security against adversaries that decrypt all ciphertexts T Horel, S Park, S Richelson, V Vaikuntanathan arXiv preprint arXiv:1802.07381, 2018 | 15 | 2018 |

Adaptive security with quasi-optimal rate B Hemenway, R Ostrovsky, S Richelson, A Rosen Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2015 | 12 | 2015 |

Concurrent zero knowledge in the bounded player model V Goyal, A Jain, R Ostrovsky, S Richelson, I Visconti Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013 | 12 | 2013 |

Constant-round concurrent zero knowledge in the bounded player model V Goyal, A Jain, R Ostrovsky, S Richelson, I Visconti Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 12 | 2013 |

Non-malleable commitments from non-malleable extractors V Goyal, A Kumar, S Park, S Richelson, A Srinivasan Manuscript, accessed via personal communication, 2018 | 8 | 2018 |

An fpga-based programmable vector engine for fast fully homomorphic encryption over the torus S Gener, P Newton, D Tan, S Richelson, G Lemieux, P Brisk SPSL: Secure and Private Systems for Machine Learning (ISCA Workshop), 2021 | 5 | 2021 |

CSProp: Ciphertext and Signature Propagation Low-Overhead Public-Key Cryptosystem for IoT Environments. F Alharbi, A Alrawais, AB Rabiah, S Richelson, NB Abu-Ghazaleh USENIX Security Symposium, 609-626, 2021 | 3 | 2021 |

Cryptographic Protocols with Strong Security: Non-Malleable Commitments, Concurrent Zero-Knowledge and Topology-Hiding Multi-Party Computation S Richelson UCLA, 2014 | 2 | 2014 |

Concurrent Zero Knowledge in the Bounded Player Model. A Jain, R Ostrovsky, S Richelson, I Visconti IACR Cryptol. ePrint Arch. 2012, 279, 2012 | 2 | 2012 |

Analyzing Ta-Shma's Code via the Expander Mixing Lemma S Richelson, S Roy arXiv preprint arXiv:2201.11166, 2022 | 1 | 2022 |

Haiku: Efficient Authenticated Key Agreement with Strong Security Guarantees for IoT A Bin Rabiah, KK Ramakrishnan, S Richelson, A Bin Rabiah, E Liri, K Kar Proceedings of the 22nd International Conference on Distributed Computing …, 2021 | 1 | 2021 |