Seuraa
Elette Boyle
Elette Boyle
Tuntematon yhteys
Vahvistettu sähköpostiosoite verkkotunnuksessa mit.edu
Nimike
Viittaukset
Viittaukset
Vuosi
Functional signatures and pseudorandom functions
E Boyle, S Goldwasser, I Ivan
International workshop on public key cryptography, 501-519, 2014
4552014
Function secret sharing
E Boyle, N Gilboa, Y Ishai
Annual international conference on the theory and applications of …, 2015
3362015
Function secret sharing: Improvements and extensions
E Boyle, N Gilboa, Y Ishai
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2692016
On extractability obfuscation
E Boyle, KM Chung, R Pass
Theory of cryptography conference, 52-73, 2014
2232014
Efficient pseudorandom correlation generators: Silent OT extension and more
E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Scholl
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
1992019
Efficient two-round OT extension and silent non-interactive secure computation
E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Rindal, P Scholl
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1742019
Breaking the circuit size barrier for secure computation under DDH
E Boyle, N Gilboa, Y Ishai
Annual International Cryptology Conference, 509-539, 2016
1592016
Compressing vector OLE
E Boyle, G Couteau, N Gilboa, Y Ishai
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1462018
Fully leakage-resilient signatures
E Boyle, G Segev, D Wichs
Journal of cryptology 26 (3), 513-558, 2013
1452013
Zero-knowledge proofs on secret-shared data via fully linear PCPs
D Boneh, E Boyle, H Corrigan-Gibbs, N Gilboa, Y Ishai
Annual International Cryptology Conference, 67-97, 2019
1262019
Oblivious parallel RAM and applications
E Boyle, KM Chung, R Pass
Theory of Cryptography Conference, 175-204, 2015
1192015
Lightweight techniques for private heavy hitters
D Boneh, E Boyle, H Corrigan-Gibbs, N Gilboa, Y Ishai
2021 IEEE Symposium on Security and Privacy (SP), 762-776, 2021
902021
Limits of extractability assumptions with distributional auxiliary input
E Boyle, R Pass
International Conference on the Theory and Application of Cryptology and …, 2015
882015
Foundations of homomorphic secret sharing
E Boyle, N Gilboa, Y Ishai, H Lin, S Tessaro
Cryptology ePrint Archive, 2017
822017
Homomorphic secret sharing: optimizations and applications
E Boyle, G Couteau, N Gilboa, Y Ishai, M Orrù
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
812017
Group-based secure computation: optimizing rounds, communication, and computation
E Boyle, N Gilboa, Y Ishai
Annual International Conference on the Theory and Applications of …, 2017
812017
Function secret sharing for mixed-mode and fixed-point secure computation
E Boyle, N Chandran, N Gilboa, D Gupta, Y Ishai, N Kumar, M Rathee
Annual International Conference on the Theory and Applications of …, 2021
802021
Efficient pseudorandom correlation generators from ring-LPN
E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Scholl
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
782020
Secure computation with preprocessing via function secret sharing
E Boyle, N Gilboa, Y Ishai
Theory of Cryptography: 17th International Conference, TCC 2019, Nuremberg …, 2019
772019
Is there an oblivious RAM lower bound?
E Boyle, M Naor
Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016
772016
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20