| No. | 
Title  | 
Author  | 
Year  | 
 
| 1 | 
On Low-End Obfuscation and Learning | 
Boyle, Elette et al. | 
2023 | 
| 2 | 
Bounded Indistinguishability for Simple Sources | 
Bogdanov, Andrej et al. | 
2022 | 
| 3 | 
Information-Theoretic Distributed Point Functions | 
Boyle, Elette et al. | 
2022 | 
| 4 | 
Locality-Preserving Hashing for Shifts with Connections to Cryptography | 
Boyle, Elette et al. | 
2022 | 
| 5 | 
On the Download Rate of Homomorphic Secret Sharing | 
Fosli, Ingerid et al. | 
2022 | 
| 6 | 
Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC | 
Badrinarayanan, Saikrishna et al. | 
2022 | 
| 7 | 
Line-Point Zero Knowledge and Its Applications | 
Dittmer, Samuel et al. | 
2021 | 
| 8 | 
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption | 
Bartusek, James et al. | 
2020 | 
| 9 | 
Limits of Preprocessing | 
Filmus, Yuval et al. | 
2020 | 
| 10 | 
On the Complexity of Decomposable Randomized Encodings, Or: How Friendly Can a Garbling-Friendly PRF Be? | 
Ball, Marshall et al. | 
2020 | 
| 11 | 
Separating Two-Round Secure Computation From Oblivious Transfer | 
Applebaum, Benny et al. | 
2020 | 
| 12 | 
Foundations of Homomorphic Secret Sharing | 
Boyle, Elette et al. | 
2018 | 
| 13 | 
Low-Complexity Cryptographic Hash Functions  | 
Applebaum, Benny et al. | 
2017 | 
| 14 | 
Lossy Chains and Fractional Secret Sharing | 
Ishai, Yuval et al. | 
2013 |