No. |
Title |
Author |
Year |
1 |
Asymmetric Multi-Party Computation |
Goyal, Vipul et al. |
2023 |
2 |
Universally Composable Almost-Everywhere Secure Computation |
Chandran, Nishanth et al. |
2022 |
3 |
Line-Point Zero Knowledge and Its Applications |
Dittmer, Samuel et al. |
2021 |
4 |
Min-Sum Clustering (With Outliers) |
Banerjee, Sandip et al. |
2021 |
5 |
Secure Merge with O(n log log n) Secure Operations |
Falk, Brett Hemenway et al. |
2021 |
6 |
Strictly Balancing Matrices in Polynomial Time Using Osborne's Iteration |
Ostrovsky, Rafail et al. |
2018 |
7 |
Coding for Interactive Communication Correcting Insertions and Deletions |
Braverman, Mark et al. |
2016 |
8 |
Provably Secure Virus Detection: Using The Observer Effect Against Malware |
Lipton, Richard J. et al. |
2016 |
9 |
A Randomized Online Quantile Summary in O(1/epsilon * log(1/epsilon)) Words |
Felber, David et al. |
2015 |
10 |
Zero-One Laws for Sliding Windows and Universal Sketches |
Braverman, Vladimir et al. |
2015 |
11 |
AMS Without 4-Wise Independence on Product Domains |
Braverman, Vladimir et al. |
2010 |
12 |
05411 Abstracts Collection -- Anonymous Communication and its Applications |
Dolev, Shlomi et al. |
2006 |