Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Brett Hemenway
@article{DBLP:journals/eccc/NobleHO24, author = {Daniel Noble and Brett Hemenway and Rafail Ostrovsky}, title = {MetaDORAM: Breaking the Log-Overhead Information Theoretic Barrier}, journal = {Electron. Colloquium Comput. Complex.}, pages = {TR24--005}, year = {2024}, url = {https://eccc.weizmann.ac.il/report/2024/005}, timestamp = {Tue, 05 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eccc/NobleHO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NobleFO24, author = {Daniel Noble and Brett Hemenway Falk and Rafail Ostrovsky}, title = {MetaDORAM: Breaking the Log-Overhead Information Theoretic Barrier}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {11}, year = {2024}, url = {https://eprint.iacr.org/2024/011}, timestamp = {Tue, 16 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NobleFO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcss/FalkNO23, author = {Brett Hemenway Falk and Rohit Nema and Rafail Ostrovsky}, title = {Linear-time 2-party secure merge from additively homomorphic encryption}, journal = {J. Comput. Syst. Sci.}, volume = {137}, pages = {37--49}, year = {2023}, url = {https://doi.org/10.1016/j.jcss.2023.04.007}, doi = {10.1016/J.JCSS.2023.04.007}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcss/FalkNO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mansci/HastingsFT23, author = {Marcella Hastings and Brett Hemenway Falk and Gerry Tsoukalas}, title = {Privacy-Preserving Network Analytics}, journal = {Manag. Sci.}, volume = {69}, number = {9}, pages = {5482--5500}, year = {2023}, url = {https://doi.org/10.1287/mnsc.2022.4582}, doi = {10.1287/MNSC.2022.4582}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mansci/HastingsFT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mansci/BenhaimFT23, author = {Alon Benhaim and Brett Hemenway Falk and Gerry Tsoukalas}, title = {Scaling Blockchains: Can Committee-Based Consensus Help?}, journal = {Manag. Sci.}, volume = {69}, number = {11}, pages = {6525--6539}, year = {2023}, url = {https://doi.org/10.1287/mnsc.2022.03177}, doi = {10.1287/MNSC.2022.03177}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mansci/BenhaimFT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FalkNR23, author = {Brett Hemenway Falk and Daniel Noble and Tal Rabin}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {Proactive Secret Sharing with Constant Communication}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14370}, pages = {337--373}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48618-0\_12}, doi = {10.1007/978-3-031-48618-0\_12}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/FalkNR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HemenwayNOSZ23, author = {Brett Hemenway and Daniel Noble and Rafail Ostrovsky and Matan Shtepel and Jacob Zhang}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {{DORAM} Revisited: Maliciously Secure {RAM-MPC} with Logarithmic Overhead}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14369}, pages = {441--470}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48615-9\_16}, doi = {10.1007/978-3-031-48615-9\_16}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/HemenwayNOSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FalkOSZ23, author = {Brett Hemenway Falk and Rafail Ostrovsky and Matan Shtepel and Jacob Zhang}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {GigaDORAM: Breaking the Billion Address Barrier}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {3871--3888}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/falk}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/FalkOSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2311-18717, author = {Brett Hemenway Falk and Gerry Tsoukalas and Niuniu Zhang}, title = {Crypto Wash Trading: Direct vs. Indirect Estimation}, journal = {CoRR}, volume = {abs/2311.18717}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.18717}, doi = {10.48550/ARXIV.2311.18717}, eprinttype = {arXiv}, eprint = {2311.18717}, timestamp = {Tue, 05 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-18717.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FalkNOSZ23, author = {Brett Hemenway Falk and Daniel Noble and Rafail Ostrovsky and Matan Shtepel and Jacob Zhang}, title = {{DORAM} revisited: Maliciously secure {RAM-MPC} with logarithmic overhead}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {578}, year = {2023}, url = {https://eprint.iacr.org/2023/578}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FalkNOSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FalkNR23, author = {Brett Hemenway Falk and Daniel Noble and Tal Rabin}, title = {Proactive Secret Sharing with Constant Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {942}, year = {2023}, url = {https://eprint.iacr.org/2023/942}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FalkNR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FalkOSZ23, author = {Brett Hemenway Falk and Rafail Ostrovsky and Matan Shtepel and Jacob Zhang}, title = {GigaDORAM: Breaking the Billion Address Barrier}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1950}, year = {2023}, url = {https://eprint.iacr.org/2023/1950}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FalkOSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscml/FalkNO22, author = {Brett Hemenway Falk and Rohit Nema and Rafail Ostrovsky}, editor = {Shlomi Dolev and Jonathan Katz and Amnon Meisels}, title = {A Linear-Time 2-Party Secure Merge Protocol}, booktitle = {Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, {CSCML} 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13301}, pages = {408--427}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07689-3\_30}, doi = {10.1007/978-3-031-07689-3\_30}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscml/FalkNO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/FalkNO22, author = {Brett Hemenway Falk and Daniel Noble and Rafail Ostrovsky}, editor = {Clemente Galdi and Stanislaw Jarecki}, title = {3-Party Distributed {ORAM} from Oblivious Set Membership}, booktitle = {Security and Cryptography for Networks - 13th International Conference, {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13409}, pages = {437--461}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-14791-3\_19}, doi = {10.1007/978-3-031-14791-3\_19}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/FalkNO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-00292, author = {Brett Hemenway Falk and Gerry Tsoukalas and Niuniu Zhang}, title = {Economics of NFTs: The Value of Creator Royalties}, journal = {CoRR}, volume = {abs/2212.00292}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.00292}, doi = {10.48550/ARXIV.2212.00292}, eprinttype = {arXiv}, eprint = {2212.00292}, timestamp = {Thu, 08 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-00292.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FalkNO22, author = {Brett Hemenway Falk and Rohit Nema and Rafail Ostrovsky}, title = {A Linear-Time 2-Party Secure Merge Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {380}, year = {2022}, url = {https://eprint.iacr.org/2022/380}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FalkNO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/FalkO21, author = {Brett Hemenway Falk and Rafail Ostrovsky}, editor = {Stefano Tessaro}, title = {Secure Merge with O(n log log n) Secure Operations}, booktitle = {2nd Conference on Information-Theoretic Cryptography, {ITC} 2021, July 23-26, 2021, Virtual Conference}, series = {LIPIcs}, volume = {199}, pages = {7:1--7:29}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.ITC.2021.7}, doi = {10.4230/LIPICS.ITC.2021.7}, timestamp = {Thu, 16 Sep 2021 15:58:53 +0200}, biburl = {https://dblp.org/rec/conf/citc/FalkO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FalkNO21, author = {Brett Hemenway Falk and Daniel Noble and Rafail Ostrovsky}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Alibi: {A} Flaw in Cuckoo-Hashing Based Hierarchical {ORAM} Schemes and a Solution}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12698}, pages = {338--369}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77883-5\_12}, doi = {10.1007/978-3-030-77883-5\_12}, timestamp = {Wed, 16 Jun 2021 12:03:13 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FalkNO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-08673, author = {Alon Benhaim and Brett Hemenway Falk and Gerry Tsoukalas}, title = {Scaling Blockchains: Can Elected Committees Help?}, journal = {CoRR}, volume = {abs/2110.08673}, year = {2021}, url = {https://arxiv.org/abs/2110.08673}, eprinttype = {arXiv}, eprint = {2110.08673}, timestamp = {Fri, 22 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-08673.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FalkNO21, author = {Brett Hemenway Falk and Daniel Noble and Rafail Ostrovsky}, title = {3-Party Distributed {ORAM} from Oblivious Set Membership}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1463}, year = {2021}, url = {https://eprint.iacr.org/2021/1463}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FalkNO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FalkHR20, author = {Brett Hemenway Falk and Nadia Heninger and Michael Rudow}, title = {Properties of constacyclic codes under the Schur product}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {6}, pages = {993--1021}, year = {2020}, url = {https://doi.org/10.1007/s10623-020-00720-3}, doi = {10.1007/S10623-020-00720-3}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/FalkHR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mansci/TsoukalasF20, author = {Gerry Tsoukalas and Brett Hemenway Falk}, title = {Token-Weighted Crowdsourcing}, journal = {Manag. Sci.}, volume = {66}, number = {9}, pages = {3843--3859}, year = {2020}, url = {https://doi.org/10.1287/mnsc.2019.3515}, doi = {10.1287/MNSC.2019.3515}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mansci/TsoukalasF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/HemenwayRW20, author = {Brett Hemenway and Noga Ron{-}Zewi and Mary Wootters}, title = {Local List Recovery of High-Rate Tensor Codes and Applications}, journal = {{SIAM} J. Comput.}, volume = {49}, number = {4}, year = {2020}, url = {https://doi.org/10.1137/17M116149X}, doi = {10.1137/17M116149X}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/HemenwayRW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FalkO20, author = {Brett Hemenway Falk and Rafail Ostrovsky}, title = {Secure merge with O(n log log n) secure operation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {807}, year = {2020}, url = {https://eprint.iacr.org/2020/807}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FalkO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FalkN20, author = {Brett Hemenway Falk and Daniel Noble}, title = {Secure Computation over Lattices and Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {926}, year = {2020}, url = {https://eprint.iacr.org/2020/926}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FalkN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FalkNO20, author = {Brett Hemenway Falk and Daniel Noble and Rafail Ostrovsky}, title = {Alibi: {A} Flaw in Cuckoo-Hashing based Hierarchical {ORAM} Schemes and a Solution}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {997}, year = {2020}, url = {https://eprint.iacr.org/2020/997}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FalkNO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/RothNFH19, author = {Edo Roth and Daniel Noble and Brett Hemenway Falk and Andreas Haeberlen}, editor = {Tim Brecht and Carey Williamson}, title = {Honeycrisp: large-scale differentially private aggregation without a trusted core}, booktitle = {Proceedings of the 27th {ACM} Symposium on Operating Systems Principles, {SOSP} 2019, Huntsville, ON, Canada, October 27-30, 2019}, pages = {196--210}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3341301.3359660}, doi = {10.1145/3341301.3359660}, timestamp = {Tue, 19 Nov 2019 12:45:13 +0100}, biburl = {https://dblp.org/rec/conf/sosp/RothNFH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/HastingsHNZ19, author = {Marcella Hastings and Brett Hemenway and Daniel Noble and Steve Zdancewic}, title = {SoK: General Purpose Compilers for Secure Multi-Party Computation}, booktitle = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco, CA, USA, May 19-23, 2019}, pages = {1220--1237}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SP.2019.00028}, doi = {10.1109/SP.2019.00028}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/sp/HastingsHNZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/FalkNO19, author = {Brett Hemenway Falk and Daniel Noble and Rafail Ostrovsky}, editor = {Lorenzo Cavallaro and Johannes Kinder and Josep Domingo{-}Ferrer}, title = {Private Set Intersection with Linear Communication from General Assumptions}, booktitle = {Proceedings of the 18th {ACM} Workshop on Privacy in the Electronic Society, WPES@CCS 2019, London, UK, November 11, 2019}, pages = {14--25}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338498.3358645}, doi = {10.1145/3338498.3358645}, timestamp = {Thu, 14 Nov 2019 11:57:18 +0100}, biburl = {https://dblp.org/rec/conf/wpes/FalkNO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/FalkLO19, author = {Brett Hemenway Falk and Steve Lu and Rafail Ostrovsky}, editor = {Lorenzo Cavallaro and Johannes Kinder and Josep Domingo{-}Ferrer}, title = {{DURASIFT:} {A} Robust, Decentralized, Encrypted Database Supporting Private Searches with Complex Policy Controls}, booktitle = {Proceedings of the 18th {ACM} Workshop on Privacy in the Electronic Society, WPES@CCS 2019, London, UK, November 11, 2019}, pages = {26--36}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338498.3358651}, doi = {10.1145/3338498.3358651}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/FalkLO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/HemenwayO18, author = {Brett Hemenway and Rafail Ostrovsky}, title = {Efficient robust secret sharing from expander graphs}, journal = {Cryptogr. Commun.}, volume = {10}, number = {1}, pages = {79--99}, year = {2018}, url = {https://doi.org/10.1007/s12095-017-0215-z}, doi = {10.1007/S12095-017-0215-Z}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/HemenwayO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/datascience/AlterFLO18, author = {George Alter and Brett Hemenway Falk and Steve Lu and Rafail Ostrovsky}, title = {Computing Statistics from Private Data}, journal = {Data Sci. J.}, volume = {17}, pages = {31}, year = {2018}, url = {https://doi.org/10.5334/dsj-2018-031}, doi = {10.5334/DSJ-2018-031}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/datascience/AlterFLO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/HemenwayW18, author = {Brett Hemenway and Mary Wootters}, title = {Linear-time list recovery of high-rate expander codes}, journal = {Inf. Comput.}, volume = {261}, pages = {202--218}, year = {2018}, url = {https://doi.org/10.1016/j.ic.2018.02.004}, doi = {10.1016/J.IC.2018.02.004}, timestamp = {Tue, 03 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/HemenwayW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GrierFLO18, author = {Quinn Grier and Brett Hemenway Falk and Steve Lu and Rafail Ostrovsky}, editor = {Roger A. Hallman and Shujun Li and Victor Chang}, title = {{ETERNAL:} Encrypted Transmission With an Error-correcting, Real-time, Noise-resilient Apparatus on Lightweight Devices}, booktitle = {Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, MPS@CCS 2018, Toronto, ON, Canada, October 15, 2018}, pages = {61--70}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3267357.3267360}, doi = {10.1145/3267357.3267360}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GrierFLO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-07630, author = {Brett Hemenway Falk and Nadia Heninger and Michael Rudow}, title = {Properties of Constacyclic Codes Under the Schur Product}, journal = {CoRR}, volume = {abs/1810.07630}, year = {2018}, url = {http://arxiv.org/abs/1810.07630}, eprinttype = {arXiv}, eprint = {1810.07630}, timestamp = {Tue, 30 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-07630.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FalkNO18, author = {Brett Hemenway Falk and Daniel Noble and Rafail Ostrovsky}, title = {Private Set Intersection with Linear Communication from General Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {238}, year = {2018}, url = {http://eprint.iacr.org/2018/238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FalkNO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/HemenwayRW17, author = {Brett Hemenway and Noga Ron{-}Zewi and Mary Wootters}, editor = {Chris Umans}, title = {Local List Recovery of High-Rate Tensor Codes {\&} Applications}, booktitle = {58th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2017, Berkeley, CA, USA, October 15-17, 2017}, pages = {204--215}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/FOCS.2017.27}, doi = {10.1109/FOCS.2017.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/focs/HemenwayRW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HemenwayRW17, author = {Brett Hemenway and Noga Ron{-}Zewi and Mary Wootters}, title = {Local List Recovery of High-rate Tensor Codes and Applications}, journal = {CoRR}, volume = {abs/1706.03383}, year = {2017}, url = {http://arxiv.org/abs/1706.03383}, eprinttype = {arXiv}, eprint = {1706.03383}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HemenwayRW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/HemenwayRW17, author = {Brett Hemenway and Noga Ron{-}Zewi and Mary Wootters}, title = {Local List Recovery of High-rate Tensor Codes {\&} Applications}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR17-104}}, year = {2017}, url = {https://eccc.weizmann.ac.il/report/2017/104}, eprinttype = {ECCC}, eprint = {TR17-104}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/HemenwayRW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/af/HemenwayK16, author = {Brett Hemenway and Sanjeev Khanna}, title = {Sensitivity and computational complexity in financial networks}, journal = {Algorithmic Finance}, volume = {5}, number = {3-4}, pages = {95--110}, year = {2016}, url = {https://doi.org/10.3233/AF-160166}, doi = {10.3233/AF-160166}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/af/HemenwayK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChinburgHHS16, author = {Ted Chinburg and Brett Hemenway and Nadia Heninger and Zachary Scherr}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Cryptographic Applications of Capacity Theory: On the Optimality of Coppersmith's Method for Univariate Polynomials}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {759--788}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_28}, doi = {10.1007/978-3-662-53887-6\_28}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChinburgHHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HemenwayJOSW16, author = {Brett Hemenway and Zahra Jafargholi and Rafail Ostrovsky and Alessandra Scafuro and Daniel Wichs}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Adaptively Secure Garbled Circuits from One-Way Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, pages = {149--178}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3\_6}, doi = {10.1007/978-3-662-53015-3\_6}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HemenwayJOSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/HemenwayLOW16, author = {Brett Hemenway and Steve Lu and Rafail Ostrovsky and William Welser IV}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {High-Precision Secure Computation of Satellite Collision Probabilities}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {169--187}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_9}, doi = {10.1007/978-3-319-44618-9\_9}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/scn/HemenwayLOW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HemenwayORR16, author = {Brett Hemenway and Rafail Ostrovsky and Silas Richelson and Alon Rosen}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Adaptive Security with Quasi-Optimal Rate}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9562}, pages = {525--541}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49096-9\_22}, doi = {10.1007/978-3-662-49096-9\_22}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HemenwayORR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/ChinburgHHS16, author = {Ted Chinburg and Brett Hemenway and Nadia Heninger and Zachary Scherr}, title = {Cryptographic applications of capacity theory: On the optimality of Coppersmith's method for univariate polynomials}, journal = {CoRR}, volume = {abs/1605.08065}, year = {2016}, url = {http://arxiv.org/abs/1605.08065}, eprinttype = {arXiv}, eprint = {1605.08065}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/ChinburgHHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HemenwayLOW16, author = {Brett Hemenway and Steve Lu and Rafail Ostrovsky and William Welser IV}, title = {High-precision Secure Computation of Satellite Collision Probabilities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {319}, year = {2016}, url = {http://eprint.iacr.org/2016/319}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HemenwayLOW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HemenwayO16, author = {Brett Hemenway and Rafail Ostrovsky}, title = {Efficient Robust Secret Sharing from Expander Graphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {735}, year = {2016}, url = {http://eprint.iacr.org/2016/735}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HemenwayO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChinburgHHS16, author = {Ted Chinburg and Brett Hemenway and Nadia Heninger and Zachary Scherr}, title = {Cryptographic applications of capacity theory: On the optimality of Coppersmith's method for univariate polynomials}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {869}, year = {2016}, url = {http://eprint.iacr.org/2016/869}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChinburgHHS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iandc/HemenwayOW15, author = {Brett Hemenway and Rafail Ostrovsky and Mary Wootters}, title = {Local correctability of expander codes}, journal = {Inf. Comput.}, volume = {243}, pages = {178--190}, year = {2015}, url = {https://doi.org/10.1016/j.ic.2014.12.013}, doi = {10.1016/J.IC.2014.12.013}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/HemenwayOW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/HemenwayW15, author = {Brett Hemenway and Mary Wootters}, editor = {Magn{\'{u}}s M. Halld{\'{o}}rsson and Kazuo Iwama and Naoki Kobayashi and Bettina Speckmann}, title = {Linear-Time List Recovery of High-Rate Expander Codes}, booktitle = {Automata, Languages, and Programming - 42nd International Colloquium, {ICALP} 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9134}, pages = {701--712}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47672-7\_57}, doi = {10.1007/978-3-662-47672-7\_57}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/HemenwayW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HemenwayOR15, author = {Brett Hemenway and Rafail Ostrovsky and Alon Rosen}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Non-committing Encryption from {\(\Phi\)}-hiding}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {591--608}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_24}, doi = {10.1007/978-3-662-46494-6\_24}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HemenwayOR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HemenwayW15, author = {Brett Hemenway and Mary Wootters}, title = {Linear-time list recovery of high-rate expander codes}, journal = {CoRR}, volume = {abs/1503.01955}, year = {2015}, url = {http://arxiv.org/abs/1503.01955}, eprinttype = {arXiv}, eprint = {1503.01955}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HemenwayW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HemenwayOR15, author = {Brett Hemenway and Rafail Ostrovsky and Alon Rosen}, title = {Non-committing encryption from {\(\Phi\)}-hiding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2015}, url = {http://eprint.iacr.org/2015/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HemenwayOR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HemenwayO15, author = {Brett Hemenway and Rafail Ostrovsky}, title = {Building Lossy Trapdoor Functions from Lossy Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {156}, year = {2015}, url = {http://eprint.iacr.org/2015/156}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HemenwayO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HemenwayJOSW15, author = {Brett Hemenway and Zahra Jafargholi and Rafail Ostrovsky and Alessandra Scafuro and Daniel Wichs}, title = {Adaptively Secure Garbled Circuits from One-Way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1250}, year = {2015}, url = {http://eprint.iacr.org/2015/1250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HemenwayJOSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HemenwayO13, author = {Brett Hemenway and Rafail Ostrovsky}, editor = {Kazue Sako and Palash Sarkar}, title = {Building Lossy Trapdoor Functions from Lossy Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {241--260}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_13}, doi = {10.1007/978-3-642-42045-0\_13}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HemenwayO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/HemenwayOW13, author = {Brett Hemenway and Rafail Ostrovsky and Mary Wootters}, editor = {Fedor V. Fomin and Rusins Freivalds and Marta Z. Kwiatkowska and David Peleg}, title = {Local Correctability of Expander Codes}, booktitle = {Automata, Languages, and Programming - 40th International Colloquium, {ICALP} 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {7965}, pages = {540--551}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39206-1\_46}, doi = {10.1007/978-3-642-39206-1\_46}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/HemenwayOW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1304-8129, author = {Brett Hemenway and Rafail Ostrovsky and Mary Wootters}, title = {Local Correctability of Expander Codes}, journal = {CoRR}, volume = {abs/1304.8129}, year = {2013}, url = {http://arxiv.org/abs/1304.8129}, eprinttype = {arXiv}, eprint = {1304.8129}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1304-8129.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ita/GilbertHRSW12, author = {Anna C. Gilbert and Brett Hemenway and Atri Rudra and Martin J. Strauss and Mary Wootters}, title = {Recovering simple signals}, booktitle = {2012 Information Theory and Applications Workshop, {ITA} 2012, San Diego, CA, USA, February 5-10, 2012}, pages = {382--391}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ITA.2012.6181772}, doi = {10.1109/ITA.2012.6181772}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/ita/GilbertHRSW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HemenwayO12, author = {Brett Hemenway and Rafail Ostrovsky}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {On Homomorphic Encryption and Chosen-Ciphertext Security}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {52--65}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_4}, doi = {10.1007/978-3-642-30057-8\_4}, timestamp = {Mon, 16 Nov 2020 15:55:52 +0100}, biburl = {https://dblp.org/rec/conf/pkc/HemenwayO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HemenwayLO12, author = {Brett Hemenway and Steve Lu and Rafail Ostrovsky}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Correlated Product Security from Any One-Way Function}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {558--575}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_33}, doi = {10.1007/978-3-642-30057-8\_33}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/HemenwayLO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HemenwayO12a, author = {Brett Hemenway and Rafail Ostrovsky}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Extended-DDH and Lossy Trapdoor Functions}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {627--643}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_37}, doi = {10.1007/978-3-642-30057-8\_37}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HemenwayO12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssp/GilbertHSWW12, author = {Anna C. Gilbert and Brett Hemenway and Martin J. Strauss and David P. Woodruff and Mary Wootters}, title = {Reusable low-error compressive sampling schemes through privacy}, booktitle = {{IEEE} Statistical Signal Processing Workshop, {SSP} 2012, Ann Arbor, MI, USA, August 5-8, 2012}, pages = {536--539}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SSP.2012.6319752}, doi = {10.1109/SSP.2012.6319752}, timestamp = {Wed, 16 Oct 2019 14:14:54 +0200}, biburl = {https://dblp.org/rec/conf/ssp/GilbertHSWW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/approx/HemenwayOSW11, author = {Brett Hemenway and Rafail Ostrovsky and Martin J. Strauss and Mary Wootters}, editor = {Leslie Ann Goldberg and Klaus Jansen and R. Ravi and Jos{\'{e}} D. P. Rolim}, title = {Public Key Locally Decodable Codes with Short Keys}, booktitle = {Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques - 14th International Workshop, {APPROX} 2011, and 15th International Workshop, {RANDOM} 2011, Princeton, NJ, USA, August 17-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6845}, pages = {605--615}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22935-0\_51}, doi = {10.1007/978-3-642-22935-0\_51}, timestamp = {Tue, 21 Sep 2021 09:36:24 +0200}, biburl = {https://dblp.org/rec/conf/approx/HemenwayOSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HemenwayLOV11, author = {Brett Hemenway and Beno{\^{\i}}t Libert and Rafail Ostrovsky and Damien Vergnaud}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {70--88}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_4}, doi = {10.1007/978-3-642-25385-0\_4}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HemenwayLOV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/HemenwayOSW11, author = {Brett Hemenway and Rafail Ostrovsky and Martin Strauss and Mary Wootters}, title = {Public Key Locally Decodable Codes with Short Keys}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR11-118}}, year = {2011}, url = {https://eccc.weizmann.ac.il/report/2011/118}, eprinttype = {ECCC}, eprint = {TR11-118}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/HemenwayOSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/HemenwayO10, author = {Brett Hemenway and Rafail Ostrovsky}, title = {Building Injective Trapdoor Functions From Oblivious Transfer}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR10-127}}, year = {2010}, url = {https://eccc.weizmann.ac.il/report/2010/127}, eprinttype = {ECCC}, eprint = {TR10-127}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/HemenwayO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HemenwayO10, author = {Brett Hemenway and Rafail Ostrovsky}, title = {Homomorphic Encryption Over Cyclic Groups Implies Chosen-Ciphertext Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2010}, url = {http://eprint.iacr.org/2010/099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HemenwayO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HemenwayLO10, author = {Brett Hemenway and Steve Lu and Rafail Ostrovsky}, title = {Correlated Product Security From Any One-Way Function and the New Notion of Decisional Correlated Product Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {100}, year = {2010}, url = {http://eprint.iacr.org/2010/100}, timestamp = {Tue, 15 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HemenwayLO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/HemenwayO09, author = {Brett Hemenway and Rafail Ostrovsky}, title = {Lossy Trapdoor Functions from Smooth Homomorphic Hash Proof Systems}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR09-127}}, year = {2009}, url = {https://eccc.weizmann.ac.il/report/2009/127}, eprinttype = {ECCC}, eprint = {TR09-127}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/HemenwayO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HemenwayLOV09, author = {Brett Hemenway and Beno{\^{\i}}t Libert and Rafail Ostrovsky and Damien Vergnaud}, title = {Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {88}, year = {2009}, url = {http://eprint.iacr.org/2009/088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HemenwayLOV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HemenwayO08, author = {Brett Hemenway and Rafail Ostrovsky}, editor = {David A. Wagner}, title = {Public-Key Locally-Decodable Codes}, booktitle = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5157}, pages = {126--143}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85174-5\_8}, doi = {10.1007/978-3-540-85174-5\_8}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HemenwayO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/HemenwayO07, author = {Brett Hemenway and Rafail Ostrovsky}, title = {Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR07-021}}, year = {2007}, url = {https://eccc.weizmann.ac.il/eccc-reports/2007/TR07-021/index.html}, eprinttype = {ECCC}, eprint = {TR07-021}, timestamp = {Wed, 28 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/HemenwayO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HemenwayO07, author = {Brett Hemenway and Rafail Ostrovsky}, title = {Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2007}, url = {http://eprint.iacr.org/2007/083}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HemenwayO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.