Functional signatures and pseudorandom functions E Boyle, S Goldwasser, I Ivan International workshop on public key cryptography, 501-519, 2014 | 321 | 2014 |
On extractability obfuscation E Boyle, KM Chung, R Pass Theory of Cryptography Conference, 52-73, 2014 | 171 | 2014 |
Function secret sharing E Boyle, N Gilboa, Y Ishai Annual international conference on the theory and applications of …, 2015 | 132 | 2015 |
Fully leakage-resilient signatures E Boyle, G Segev, D Wichs Journal of cryptology 26 (3), 513-558, 2013 | 122 | 2013 |
Oblivious parallel RAM and applications E Boyle, KM Chung, R Pass Theory of Cryptography Conference, 175-204, 2016 | 85 | 2016 |
Breaking the circuit size barrier for secure computation under DDH E Boyle, N Gilboa, Y Ishai Annual International Cryptology Conference, 509-539, 2016 | 80 | 2016 |
Function secret sharing: Improvements and extensions E Boyle, N Gilboa, Y Ishai Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 76 | 2016 |
Limits of extractability assumptions with distributional auxiliary input E Boyle, R Pass International Conference on the Theory and Application of Cryptology and …, 2015 | 60 | 2015 |
Communication locality in secure multi-party computation E Boyle, S Goldwasser, S Tessaro Theory of Cryptography Conference, 356-376, 2013 | 56 | 2013 |
Group-based secure computation: optimizing rounds, communication, and computation E Boyle, N Gilboa, Y Ishai Annual International Conference on the Theory and Applications of …, 2017 | 50 | 2017 |
Large-scale secure computation: Multi-party computation for (parallel) RAM programs E Boyle, KM Chung, R Pass Annual Cryptology Conference, 742-762, 2015 | 50* | 2015 |
Multiparty computation secure against continual memory leakage E Boyle, S Goldwasser, A Jain, YT Kalai Proceedings of the forty-fourth annual ACM symposium on Theory of computing …, 2012 | 47 | 2012 |
Is there an oblivious ram lower bound? E Boyle, M Naor Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016 | 45 | 2016 |
Foundations of homomorphic secret sharing E Boyle, N Gilboa, Y Ishai, H Lin, S Tessaro 9th Innovations in Theoretical Computer Science Conference (ITCS 2018), 2018 | 35 | 2018 |
Compressing vector OLE E Boyle, G Couteau, N Gilboa, Y Ishai Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 33 | 2018 |
Homomorphic secret sharing: optimizations and applications E Boyle, G Couteau, N Gilboa, Y Ishai, M Orrų Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 29 | 2017 |
Secure computation against adaptive auxiliary information E Boyle, S Garg, A Jain, YT Kalai, A Sahai Annual Cryptology Conference, 316-334, 2013 | 29 | 2013 |
Efficient pseudorandom correlation generators: Silent OT extension and more E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Scholl Annual International Cryptology Conference, 489-518, 2019 | 26 | 2019 |
Leakage-resilient coin tossing E Boyle, S Goldwasser, YT Kalai Distributed computing 27 (3), 147-164, 2014 | 23 | 2014 |
Efficient two-round OT extension and silent non-interactive secure computation E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Rindal, P Scholl Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 21 | 2019 |