Multi-input functional encryption S Goldwasser, SD Gordon, V Goyal, A Jain, J Katz, FH Liu, A Sahai, E Shi, ... Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014 | 440 | 2014 |
A group signature scheme from lattice assumptions SD Gordon, J Katz, V Vaikuntanathan Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010 | 298 | 2010 |
Rational secret sharing, revisited SD Gordon, J Katz Security and Cryptography for Networks: 5th International Conference, SCN …, 2006 | 267 | 2006 |
Secure two-party computation in sublinear (amortized) time SD Gordon, J Katz, V Kolesnikov, F Krell, T Malkin, M Raykova, Y Vahlis Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 206 | 2012 |
Complete fairness in secure two-party computation SD Gordon, C Hazay, J Katz, Y Lindell Journal of the ACM (JACM) 58 (6), 1-37, 2011 | 206 | 2011 |
Partial fairness in secure two-party computation SD Gordon, J Katz Journal of cryptology 25 (1), 14-40, 2012 | 132 | 2012 |
Constant-round MPC with fairness and guarantee of output delivery S Dov Gordon, FH Liu, E Shi Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015 | 102 | 2015 |
Secure computation with differentially private access patterns S Mazloom, SD Gordon Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 68 | 2018 |
Multi-client verifiable computation with stronger security guarantees SD Gordon, J Katz, FH Liu, E Shi, HS Zhou Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015 | 68 | 2015 |
Complete fairness in multi-party computation without an honest majority SD Gordon, J Katz Theory of Cryptography Conference, 19-35, 2009 | 58 | 2009 |
On complete primitives for fairness D Gordon, Y Ishai, T Moran, R Ostrovsky, A Sahai Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010 | 56 | 2010 |
Multi-input functional encryption SD Gordon, J Katz, FH Liu, E Shi, HS Zhou Cryptology ePrint Archive, 2013 | 54 | 2013 |
On the relationship between functional encryption, obfuscation, and fully homomorphic encryption J Alwen, M Barbosa, P Farshim, R Gennaro, SD Gordon, S Tessaro, ... Cryptography and Coding: 14th IMA International Conference, IMACC 2013 …, 2013 | 49 | 2013 |
Two-party private set intersection with an untrusted third party PH Le, S Ranellucci, SD Gordon Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 45 | 2019 |
Secure computation with low communication from cross-checking SD Gordon, S Ranellucci, X Wang Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 44 | 2018 |
Simple and efficient two-server ORAM SD Gordon, J Katz, X Wang Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 40* | 2018 |
Secure computation of MIPS machine code X Wang, SD Gordon, A McIntosh, J Katz Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 37 | 2016 |
Multi-party computation of polynomials and branching programs without simultaneous interaction SD Gordon, T Malkin, M Rosulek, H Wee Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013 | 37 | 2013 |
Compressed oblivious encoding for homomorphically encrypted search SG Choi, D Dachman-Soled, SD Gordon, L Liu, A Yerukhimovich Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 24 | 2021 |
Secure parallel computation on national scale volumes of data S Mazloom, PH Le, S Ranellucci, SD Gordon 29th USENIX Security Symposium (USENIX Security 20), 2487-2504, 2020 | 24 | 2020 |