| Publication | Date of Publication | Type |
|---|
| Revisiting the Power of Non-Equivocation in Distributed Protocols | 2024-03-26 | Paper |
| On the Amortized Communication Complexity of Byzantine Broadcast | 2024-03-26 | Paper |
| Optimal single-server private information retrieval | 2024-01-16 | Paper |
| NanoGRAM: garbled RAM with \(\widetilde{O}(\log N)\) overhead | 2024-01-16 | Paper |
| https://portal.mardi4nfdi.de/entity/Q6147390 | 2024-01-15 | Paper |
| A theory of composition for differential obliviousness | 2023-12-12 | Paper |
| Multi-client inner product encryption: function-hiding instantiations without random oracles | 2023-11-24 | Paper |
| Oblivious parallel tight compaction | 2023-11-02 | Paper |
| Perfectly Oblivious (Parallel) RAM Revisited, and Improved Constructions. | 2023-07-03 | Paper |
| Differentially Oblivious Database Joins: Overcoming the Worst-Case Curse of Fully Oblivious Algorithms | 2023-07-03 | Paper |
| \(\log^\ast\)-round game-theoretically-fair leader election | 2023-06-30 | Paper |
| Maliciously secure massively parallel computation for all-but-one corruptions | 2023-06-12 | Paper |
| Foundations of Differentially Oblivious Algorithms | 2023-04-27 | Paper |
| Oblivious RAM with worst-case logarithmic overhead | 2023-04-13 | Paper |
| On the adaptive security of MACs and PRFs | 2023-03-21 | Paper |
| Communication complexity of Byzantine agreement, revisited | 2023-03-14 | Paper |
| MPC for MPC: Secure Computation on a Massively Parallel Computing Architecture | 2023-02-03 | Paper |
| A complete characterization of game-theoretically fair, multi-party coin toss | 2022-08-30 | Paper |
| Sorting Short Keys in Circuits of Size ${o(n \log n)}$ | 2022-05-31 | Paper |
| Oblivious RAM with \textit{worst-case} logarithmic overhead | 2022-05-18 | Paper |
| Puncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and time | 2022-05-18 | Paper |
| Game-theoretic fairness meets multi-party protocols: the case of leader election | 2022-04-22 | Paper |
| OptORAMa: optimal oblivious RAM | 2022-03-23 | Paper |
| Secure massively parallel computation for dishonest majority | 2022-03-23 | Paper |
| Locality-preserving oblivious RAM | 2022-03-03 | Paper |
| Non-interactive anonymous router | 2021-12-08 | Paper |
| Sublinear-round Byzantine agreement under corrupt majority | 2021-12-01 | Paper |
| Expected constant round Byzantine broadcast under dishonest majority | 2021-12-01 | Paper |
| Round-efficient Byzantine broadcast under strongly adaptive and majority corruptions | 2021-12-01 | Paper |
| Lower Bounds for External Memory Integer Sorting via Network Coding | 2021-10-18 | Paper |
| Communication Complexity of Byzantine Agreement, Revisited | 2021-01-20 | Paper |
| Synchronous, with a chance of partition tolerance | 2020-05-20 | Paper |
| Streamlined blockchains: a simple and elegant approach (a tutorial and survey) | 2020-05-20 | Paper |
| Towards attribute-based encryption for RAMs from LWE: sub-linear decryption, and more | 2020-05-20 | Paper |
| Locally decodable and updatable non-malleable codes and their applications | 2020-03-03 | Paper |
| Locality-preserving oblivious RAM | 2020-02-06 | Paper |
| Lower bounds for external memory integer sorting via network coding | 2020-01-30 | Paper |
| Can We Overcome the n log n Barrier for Oblivious Sorting? | 2019-10-15 | Paper |
| Foundations of Differentially Oblivious Algorithms | 2019-10-15 | Paper |
| Oblivious network RAM and leveraging parallelism to achieve obliviousness | 2019-08-13 | Paper |
| More is less: perfectly secure oblivious algorithms in the multi-server setting | 2019-01-23 | Paper |
| Game theoretic notions of fairness in multi-party coin toss | 2018-12-11 | Paper |
| Perfectly secure oblivious parallel RAM | 2018-12-06 | Paper |
| Path ORAM | 2018-12-06 | Paper |
| Distributed Private Data Analysis | 2018-11-12 | Paper |
| Thunderella: blockchains with optimistic instant confirmation | 2018-07-09 | Paper |
| On the depth of oblivious parallel RAM | 2018-04-06 | Paper |
| Oblivious hashing revisited, and applications to asymptotically efficient ORAM and OPRAM | 2018-04-06 | Paper |
| https://portal.mardi4nfdi.de/entity/Q4608037 | 2018-03-15 | Paper |
| The sleepy model of consensus | 2018-03-08 | Paper |
| Circuit OPRAM: unifying statistically and computationally secure ORAMs and OPRAMs | 2018-01-19 | Paper |
| FruitChains | 2017-10-11 | Paper |
| Formal Abstractions for Attested Execution Secure Processors | 2017-06-13 | Paper |
| Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness | 2016-06-10 | Paper |
| Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM | 2016-04-08 | Paper |
| Constant-Round MPC with Fairness and Guarantee of Output Delivery | 2015-12-10 | Paper |
| Locally Decodable and Updatable Non-malleable Codes and Their Applications | 2015-07-06 | Paper |
| Multi-Client Verifiable Computation with Stronger Security Guarantees | 2015-07-06 | Paper |
| Multi-input Functional Encryption | 2014-05-27 | Paper |
| Verifiable Oblivious Storage | 2014-03-25 | Paper |
| Streaming Authenticated Data Structures | 2013-05-31 | Paper |
| Signatures of Correct Computation | 2013-03-18 | Paper |
| Privacy-Preserving Stream Aggregation with Fault Tolerance | 2012-11-09 | Paper |
| Optimal Lower Bound for Differentially Private Multi-party Aggregation | 2012-09-25 | Paper |
| Policy-Enhanced Private Set Intersection: Sharing Information While Enforcing Privacy Policies | 2012-07-20 | Paper |
| Oblivious RAM with O((logN)3) Worst-Case Cost | 2011-12-02 | Paper |
| Private and Continual Release of Statistics | 2010-09-07 | Paper |
| Signatures of Reputation | 2010-08-17 | Paper |
| Predicate Privacy in Encryption Systems | 2009-03-03 | Paper |
| Delegating Capabilities in Predicate Encryption Systems | 2008-08-19 | Paper |