| No. |
Title |
Author |
Year |
| 1 |
Asymmetric Multi-Party Computation |
Goyal, Vipul et al. |
2023 |
| 2 |
Universally Composable Almost-Everywhere Secure Computation |
Chandran, Nishanth et al. |
2022 |
| 3 |
Line-Point Zero Knowledge and Its Applications |
Dittmer, Samuel et al. |
2021 |
| 4 |
Min-Sum Clustering (With Outliers) |
Banerjee, Sandip et al. |
2021 |
| 5 |
Secure Merge with O(n log log n) Secure Operations |
Falk, Brett Hemenway et al. |
2021 |
| 6 |
Strictly Balancing Matrices in Polynomial Time Using Osborne's Iteration |
Ostrovsky, Rafail et al. |
2018 |
| 7 |
Coding for Interactive Communication Correcting Insertions and Deletions |
Braverman, Mark et al. |
2016 |
| 8 |
Provably Secure Virus Detection: Using The Observer Effect Against Malware |
Lipton, Richard J. et al. |
2016 |
| 9 |
A Randomized Online Quantile Summary in O(1/epsilon * log(1/epsilon)) Words |
Felber, David et al. |
2015 |
| 10 |
Zero-One Laws for Sliding Windows and Universal Sketches |
Braverman, Vladimir et al. |
2015 |
| 11 |
AMS Without 4-Wise Independence on Product Domains |
Braverman, Vladimir et al. |
2010 |
| 12 |
05411 Abstracts Collection -- Anonymous Communication and its Applications |
Dolev, Shlomi et al. |
2006 |