Functional signatures and pseudorandom functions E Boyle, S Goldwasser, I Ivan International workshop on public key cryptography, 501-519, 2014 | 479 | 2014 |
Function secret sharing E Boyle, N Gilboa, Y Ishai Annual international conference on the theory and applications of …, 2015 | 380 | 2015 |
Function secret sharing: Improvements and extensions E Boyle, N Gilboa, Y Ishai Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 317 | 2016 |
Efficient pseudorandom correlation generators: Silent OT extension and more E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Scholl Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 242 | 2019 |
On extractability obfuscation E Boyle, KM Chung, R Pass Theory of cryptography conference, 52-73, 2014 | 227 | 2014 |
Efficient two-round OT extension and silent non-interactive secure computation E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Rindal, P Scholl Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 213 | 2019 |
Compressing vector OLE E Boyle, G Couteau, N Gilboa, Y Ishai Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 175 | 2018 |
Breaking the circuit size barrier for secure computation under DDH E Boyle, N Gilboa, Y Ishai Annual International Cryptology Conference, 509-539, 2016 | 171 | 2016 |
Fully leakage-resilient signatures E Boyle, G Segev, D Wichs Journal of cryptology 26 (3), 513-558, 2013 | 146 | 2013 |
Zero-knowledge proofs on secret-shared data via fully linear PCPs D Boneh, E Boyle, H Corrigan-Gibbs, N Gilboa, Y Ishai Annual International Cryptology Conference, 67-97, 2019 | 141 | 2019 |
Oblivious parallel RAM and applications E Boyle, KM Chung, R Pass Theory of Cryptography Conference, 175-204, 2015 | 128 | 2015 |
Lightweight techniques for private heavy hitters D Boneh, E Boyle, H Corrigan-Gibbs, N Gilboa, Y Ishai 2021 IEEE Symposium on Security and Privacy (SP), 762-776, 2021 | 107 | 2021 |
Function secret sharing for mixed-mode and fixed-point secure computation E Boyle, N Chandran, N Gilboa, D Gupta, Y Ishai, N Kumar, M Rathee Annual International Conference on the Theory and Applications of …, 2021 | 100 | 2021 |
Secure computation with preprocessing via function secret sharing E Boyle, N Gilboa, Y Ishai Theory of Cryptography: 17th International Conference, TCC 2019, Nuremberg …, 2019 | 98 | 2019 |
Limits of extractability assumptions with distributional auxiliary input E Boyle, R Pass International Conference on the Theory and Application of Cryptology and …, 2015 | 91 | 2015 |
Homomorphic secret sharing: optimizations and applications E Boyle, G Couteau, N Gilboa, Y Ishai, M Orrù Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 89 | 2017 |
Efficient pseudorandom correlation generators from ring-LPN E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Scholl Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 87 | 2020 |
Group-based secure computation: optimizing rounds, communication, and computation E Boyle, N Gilboa, Y Ishai Annual International Conference on the Theory and Applications of …, 2017 | 86 | 2017 |
Foundations of homomorphic secret sharing E Boyle, N Gilboa, Y Ishai, H Lin, S Tessaro Cryptology ePrint Archive, 2017 | 86 | 2017 |
Is there an oblivious RAM lower bound? E Boyle, M Naor Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016 | 82 | 2016 |