No. |
Title |
Author |
Year |
1 |
On Low-End Obfuscation and Learning |
Boyle, Elette et al. |
2023 |
2 |
Bounded Indistinguishability for Simple Sources |
Bogdanov, Andrej et al. |
2022 |
3 |
Information-Theoretic Distributed Point Functions |
Boyle, Elette et al. |
2022 |
4 |
Locality-Preserving Hashing for Shifts with Connections to Cryptography |
Boyle, Elette et al. |
2022 |
5 |
On the Download Rate of Homomorphic Secret Sharing |
Fosli, Ingerid et al. |
2022 |
6 |
Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC |
Badrinarayanan, Saikrishna et al. |
2022 |
7 |
Line-Point Zero Knowledge and Its Applications |
Dittmer, Samuel et al. |
2021 |
8 |
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption |
Bartusek, James et al. |
2020 |
9 |
Limits of Preprocessing |
Filmus, Yuval et al. |
2020 |
10 |
On the Complexity of Decomposable Randomized Encodings, Or: How Friendly Can a Garbling-Friendly PRF Be? |
Ball, Marshall et al. |
2020 |
11 |
Separating Two-Round Secure Computation From Oblivious Transfer |
Applebaum, Benny et al. |
2020 |
12 |
Foundations of Homomorphic Secret Sharing |
Boyle, Elette et al. |
2018 |
13 |
Low-Complexity Cryptographic Hash Functions |
Applebaum, Benny et al. |
2017 |
14 |
Lossy Chains and Fractional Secret Sharing |
Ishai, Yuval et al. |
2013 |