BibTeX records: Brett Hemenway

download as .bib file

@article{DBLP:journals/eccc/NobleHO24,
  author       = {Daniel Noble and
                  Brett Hemenway and
                  Rafail Ostrovsky},
  title        = {MetaDORAM: Breaking the Log-Overhead Information Theoretic Barrier},
  journal      = {Electron. Colloquium Comput. Complex.},
  pages        = {TR24--005},
  year         = {2024},
  url          = {https://eccc.weizmann.ac.il/report/2024/005},
  timestamp    = {Tue, 05 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eccc/NobleHO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NobleFO24,
  author       = {Daniel Noble and
                  Brett Hemenway Falk and
                  Rafail Ostrovsky},
  title        = {MetaDORAM: Breaking the Log-Overhead Information Theoretic Barrier},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {11},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/011},
  timestamp    = {Tue, 16 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NobleFO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcss/FalkNO23,
  author       = {Brett Hemenway Falk and
                  Rohit Nema and
                  Rafail Ostrovsky},
  title        = {Linear-time 2-party secure merge from additively homomorphic encryption},
  journal      = {J. Comput. Syst. Sci.},
  volume       = {137},
  pages        = {37--49},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jcss.2023.04.007},
  doi          = {10.1016/J.JCSS.2023.04.007},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcss/FalkNO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mansci/HastingsFT23,
  author       = {Marcella Hastings and
                  Brett Hemenway Falk and
                  Gerry Tsoukalas},
  title        = {Privacy-Preserving Network Analytics},
  journal      = {Manag. Sci.},
  volume       = {69},
  number       = {9},
  pages        = {5482--5500},
  year         = {2023},
  url          = {https://doi.org/10.1287/mnsc.2022.4582},
  doi          = {10.1287/MNSC.2022.4582},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mansci/HastingsFT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mansci/BenhaimFT23,
  author       = {Alon Benhaim and
                  Brett Hemenway Falk and
                  Gerry Tsoukalas},
  title        = {Scaling Blockchains: Can Committee-Based Consensus Help?},
  journal      = {Manag. Sci.},
  volume       = {69},
  number       = {11},
  pages        = {6525--6539},
  year         = {2023},
  url          = {https://doi.org/10.1287/mnsc.2022.03177},
  doi          = {10.1287/MNSC.2022.03177},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mansci/BenhaimFT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/FalkNR23,
  author       = {Brett Hemenway Falk and
                  Daniel Noble and
                  Tal Rabin},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Proactive Secret Sharing with Constant Communication},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14370},
  pages        = {337--373},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48618-0\_12},
  doi          = {10.1007/978-3-031-48618-0\_12},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/FalkNR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HemenwayNOSZ23,
  author       = {Brett Hemenway and
                  Daniel Noble and
                  Rafail Ostrovsky and
                  Matan Shtepel and
                  Jacob Zhang},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {{DORAM} Revisited: Maliciously Secure {RAM-MPC} with Logarithmic Overhead},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14369},
  pages        = {441--470},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48615-9\_16},
  doi          = {10.1007/978-3-031-48615-9\_16},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/HemenwayNOSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FalkOSZ23,
  author       = {Brett Hemenway Falk and
                  Rafail Ostrovsky and
                  Matan Shtepel and
                  Jacob Zhang},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {GigaDORAM: Breaking the Billion Address Barrier},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {3871--3888},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/falk},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/FalkOSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-18717,
  author       = {Brett Hemenway Falk and
                  Gerry Tsoukalas and
                  Niuniu Zhang},
  title        = {Crypto Wash Trading: Direct vs. Indirect Estimation},
  journal      = {CoRR},
  volume       = {abs/2311.18717},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.18717},
  doi          = {10.48550/ARXIV.2311.18717},
  eprinttype    = {arXiv},
  eprint       = {2311.18717},
  timestamp    = {Tue, 05 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-18717.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FalkNOSZ23,
  author       = {Brett Hemenway Falk and
                  Daniel Noble and
                  Rafail Ostrovsky and
                  Matan Shtepel and
                  Jacob Zhang},
  title        = {{DORAM} revisited: Maliciously secure {RAM-MPC} with logarithmic overhead},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {578},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/578},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FalkNOSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FalkNR23,
  author       = {Brett Hemenway Falk and
                  Daniel Noble and
                  Tal Rabin},
  title        = {Proactive Secret Sharing with Constant Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {942},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/942},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FalkNR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FalkOSZ23,
  author       = {Brett Hemenway Falk and
                  Rafail Ostrovsky and
                  Matan Shtepel and
                  Jacob Zhang},
  title        = {GigaDORAM: Breaking the Billion Address Barrier},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1950},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1950},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FalkOSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cscml/FalkNO22,
  author       = {Brett Hemenway Falk and
                  Rohit Nema and
                  Rafail Ostrovsky},
  editor       = {Shlomi Dolev and
                  Jonathan Katz and
                  Amnon Meisels},
  title        = {A Linear-Time 2-Party Secure Merge Protocol},
  booktitle    = {Cyber Security, Cryptology, and Machine Learning - 6th International
                  Symposium, {CSCML} 2022, Be'er Sheva, Israel, June 30 - July 1, 2022,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13301},
  pages        = {408--427},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07689-3\_30},
  doi          = {10.1007/978-3-031-07689-3\_30},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cscml/FalkNO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/FalkNO22,
  author       = {Brett Hemenway Falk and
                  Daniel Noble and
                  Rafail Ostrovsky},
  editor       = {Clemente Galdi and
                  Stanislaw Jarecki},
  title        = {3-Party Distributed {ORAM} from Oblivious Set Membership},
  booktitle    = {Security and Cryptography for Networks - 13th International Conference,
                  {SCN} 2022, Amalfi, Italy, September 12-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13409},
  pages        = {437--461},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-14791-3\_19},
  doi          = {10.1007/978-3-031-14791-3\_19},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/FalkNO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-00292,
  author       = {Brett Hemenway Falk and
                  Gerry Tsoukalas and
                  Niuniu Zhang},
  title        = {Economics of NFTs: The Value of Creator Royalties},
  journal      = {CoRR},
  volume       = {abs/2212.00292},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.00292},
  doi          = {10.48550/ARXIV.2212.00292},
  eprinttype    = {arXiv},
  eprint       = {2212.00292},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-00292.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FalkNO22,
  author       = {Brett Hemenway Falk and
                  Rohit Nema and
                  Rafail Ostrovsky},
  title        = {A Linear-Time 2-Party Secure Merge Protocol},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {380},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/380},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FalkNO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/FalkO21,
  author       = {Brett Hemenway Falk and
                  Rafail Ostrovsky},
  editor       = {Stefano Tessaro},
  title        = {Secure Merge with O(n log log n) Secure Operations},
  booktitle    = {2nd Conference on Information-Theoretic Cryptography, {ITC} 2021,
                  July 23-26, 2021, Virtual Conference},
  series       = {LIPIcs},
  volume       = {199},
  pages        = {7:1--7:29},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2021},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2021.7},
  doi          = {10.4230/LIPICS.ITC.2021.7},
  timestamp    = {Thu, 16 Sep 2021 15:58:53 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/FalkO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FalkNO21,
  author       = {Brett Hemenway Falk and
                  Daniel Noble and
                  Rafail Ostrovsky},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Alibi: {A} Flaw in Cuckoo-Hashing Based Hierarchical {ORAM} Schemes
                  and a Solution},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12698},
  pages        = {338--369},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77883-5\_12},
  doi          = {10.1007/978-3-030-77883-5\_12},
  timestamp    = {Wed, 16 Jun 2021 12:03:13 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FalkNO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-08673,
  author       = {Alon Benhaim and
                  Brett Hemenway Falk and
                  Gerry Tsoukalas},
  title        = {Scaling Blockchains: Can Elected Committees Help?},
  journal      = {CoRR},
  volume       = {abs/2110.08673},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.08673},
  eprinttype    = {arXiv},
  eprint       = {2110.08673},
  timestamp    = {Fri, 22 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-08673.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FalkNO21,
  author       = {Brett Hemenway Falk and
                  Daniel Noble and
                  Rafail Ostrovsky},
  title        = {3-Party Distributed {ORAM} from Oblivious Set Membership},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1463},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1463},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FalkNO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FalkHR20,
  author       = {Brett Hemenway Falk and
                  Nadia Heninger and
                  Michael Rudow},
  title        = {Properties of constacyclic codes under the Schur product},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {6},
  pages        = {993--1021},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-020-00720-3},
  doi          = {10.1007/S10623-020-00720-3},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/FalkHR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mansci/TsoukalasF20,
  author       = {Gerry Tsoukalas and
                  Brett Hemenway Falk},
  title        = {Token-Weighted Crowdsourcing},
  journal      = {Manag. Sci.},
  volume       = {66},
  number       = {9},
  pages        = {3843--3859},
  year         = {2020},
  url          = {https://doi.org/10.1287/mnsc.2019.3515},
  doi          = {10.1287/MNSC.2019.3515},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mansci/TsoukalasF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/HemenwayRW20,
  author       = {Brett Hemenway and
                  Noga Ron{-}Zewi and
                  Mary Wootters},
  title        = {Local List Recovery of High-Rate Tensor Codes and Applications},
  journal      = {{SIAM} J. Comput.},
  volume       = {49},
  number       = {4},
  year         = {2020},
  url          = {https://doi.org/10.1137/17M116149X},
  doi          = {10.1137/17M116149X},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/HemenwayRW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FalkO20,
  author       = {Brett Hemenway Falk and
                  Rafail Ostrovsky},
  title        = {Secure merge with O(n log log n) secure operation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {807},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/807},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FalkO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FalkN20,
  author       = {Brett Hemenway Falk and
                  Daniel Noble},
  title        = {Secure Computation over Lattices and Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {926},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/926},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FalkN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FalkNO20,
  author       = {Brett Hemenway Falk and
                  Daniel Noble and
                  Rafail Ostrovsky},
  title        = {Alibi: {A} Flaw in Cuckoo-Hashing based Hierarchical {ORAM} Schemes
                  and a Solution},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {997},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/997},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FalkNO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/RothNFH19,
  author       = {Edo Roth and
                  Daniel Noble and
                  Brett Hemenway Falk and
                  Andreas Haeberlen},
  editor       = {Tim Brecht and
                  Carey Williamson},
  title        = {Honeycrisp: large-scale differentially private aggregation without
                  a trusted core},
  booktitle    = {Proceedings of the 27th {ACM} Symposium on Operating Systems Principles,
                  {SOSP} 2019, Huntsville, ON, Canada, October 27-30, 2019},
  pages        = {196--210},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3341301.3359660},
  doi          = {10.1145/3341301.3359660},
  timestamp    = {Tue, 19 Nov 2019 12:45:13 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/RothNFH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/HastingsHNZ19,
  author       = {Marcella Hastings and
                  Brett Hemenway and
                  Daniel Noble and
                  Steve Zdancewic},
  title        = {SoK: General Purpose Compilers for Secure Multi-Party Computation},
  booktitle    = {2019 {IEEE} Symposium on Security and Privacy, {SP} 2019, San Francisco,
                  CA, USA, May 19-23, 2019},
  pages        = {1220--1237},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/SP.2019.00028},
  doi          = {10.1109/SP.2019.00028},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/HastingsHNZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/FalkNO19,
  author       = {Brett Hemenway Falk and
                  Daniel Noble and
                  Rafail Ostrovsky},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Josep Domingo{-}Ferrer},
  title        = {Private Set Intersection with Linear Communication from General Assumptions},
  booktitle    = {Proceedings of the 18th {ACM} Workshop on Privacy in the Electronic
                  Society, WPES@CCS 2019, London, UK, November 11, 2019},
  pages        = {14--25},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338498.3358645},
  doi          = {10.1145/3338498.3358645},
  timestamp    = {Thu, 14 Nov 2019 11:57:18 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/FalkNO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/FalkLO19,
  author       = {Brett Hemenway Falk and
                  Steve Lu and
                  Rafail Ostrovsky},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  Josep Domingo{-}Ferrer},
  title        = {{DURASIFT:} {A} Robust, Decentralized, Encrypted Database Supporting
                  Private Searches with Complex Policy Controls},
  booktitle    = {Proceedings of the 18th {ACM} Workshop on Privacy in the Electronic
                  Society, WPES@CCS 2019, London, UK, November 11, 2019},
  pages        = {26--36},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338498.3358651},
  doi          = {10.1145/3338498.3358651},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/FalkLO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/HemenwayO18,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky},
  title        = {Efficient robust secret sharing from expander graphs},
  journal      = {Cryptogr. Commun.},
  volume       = {10},
  number       = {1},
  pages        = {79--99},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12095-017-0215-z},
  doi          = {10.1007/S12095-017-0215-Z},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/HemenwayO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/datascience/AlterFLO18,
  author       = {George Alter and
                  Brett Hemenway Falk and
                  Steve Lu and
                  Rafail Ostrovsky},
  title        = {Computing Statistics from Private Data},
  journal      = {Data Sci. J.},
  volume       = {17},
  pages        = {31},
  year         = {2018},
  url          = {https://doi.org/10.5334/dsj-2018-031},
  doi          = {10.5334/DSJ-2018-031},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/datascience/AlterFLO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/HemenwayW18,
  author       = {Brett Hemenway and
                  Mary Wootters},
  title        = {Linear-time list recovery of high-rate expander codes},
  journal      = {Inf. Comput.},
  volume       = {261},
  pages        = {202--218},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ic.2018.02.004},
  doi          = {10.1016/J.IC.2018.02.004},
  timestamp    = {Tue, 03 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/HemenwayW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GrierFLO18,
  author       = {Quinn Grier and
                  Brett Hemenway Falk and
                  Steve Lu and
                  Rafail Ostrovsky},
  editor       = {Roger A. Hallman and
                  Shujun Li and
                  Victor Chang},
  title        = {{ETERNAL:} Encrypted Transmission With an Error-correcting, Real-time,
                  Noise-resilient Apparatus on Lightweight Devices},
  booktitle    = {Proceedings of the 2nd International Workshop on Multimedia Privacy
                  and Security, MPS@CCS 2018, Toronto, ON, Canada, October 15, 2018},
  pages        = {61--70},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3267357.3267360},
  doi          = {10.1145/3267357.3267360},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GrierFLO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-07630,
  author       = {Brett Hemenway Falk and
                  Nadia Heninger and
                  Michael Rudow},
  title        = {Properties of Constacyclic Codes Under the Schur Product},
  journal      = {CoRR},
  volume       = {abs/1810.07630},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.07630},
  eprinttype    = {arXiv},
  eprint       = {1810.07630},
  timestamp    = {Tue, 30 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-07630.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FalkNO18,
  author       = {Brett Hemenway Falk and
                  Daniel Noble and
                  Rafail Ostrovsky},
  title        = {Private Set Intersection with Linear Communication from General Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {238},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FalkNO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/HemenwayRW17,
  author       = {Brett Hemenway and
                  Noga Ron{-}Zewi and
                  Mary Wootters},
  editor       = {Chris Umans},
  title        = {Local List Recovery of High-Rate Tensor Codes {\&} Applications},
  booktitle    = {58th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2017, Berkeley, CA, USA, October 15-17, 2017},
  pages        = {204--215},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/FOCS.2017.27},
  doi          = {10.1109/FOCS.2017.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/HemenwayRW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HemenwayRW17,
  author       = {Brett Hemenway and
                  Noga Ron{-}Zewi and
                  Mary Wootters},
  title        = {Local List Recovery of High-rate Tensor Codes and Applications},
  journal      = {CoRR},
  volume       = {abs/1706.03383},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.03383},
  eprinttype    = {arXiv},
  eprint       = {1706.03383},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HemenwayRW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/HemenwayRW17,
  author       = {Brett Hemenway and
                  Noga Ron{-}Zewi and
                  Mary Wootters},
  title        = {Local List Recovery of High-rate Tensor Codes {\&} Applications},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR17-104}},
  year         = {2017},
  url          = {https://eccc.weizmann.ac.il/report/2017/104},
  eprinttype    = {ECCC},
  eprint       = {TR17-104},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/HemenwayRW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/af/HemenwayK16,
  author       = {Brett Hemenway and
                  Sanjeev Khanna},
  title        = {Sensitivity and computational complexity in financial networks},
  journal      = {Algorithmic Finance},
  volume       = {5},
  number       = {3-4},
  pages        = {95--110},
  year         = {2016},
  url          = {https://doi.org/10.3233/AF-160166},
  doi          = {10.3233/AF-160166},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/af/HemenwayK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ChinburgHHS16,
  author       = {Ted Chinburg and
                  Brett Hemenway and
                  Nadia Heninger and
                  Zachary Scherr},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Cryptographic Applications of Capacity Theory: On the Optimality of
                  Coppersmith's Method for Univariate Polynomials},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {759--788},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_28},
  doi          = {10.1007/978-3-662-53887-6\_28},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ChinburgHHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HemenwayJOSW16,
  author       = {Brett Hemenway and
                  Zahra Jafargholi and
                  Rafail Ostrovsky and
                  Alessandra Scafuro and
                  Daniel Wichs},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Adaptively Secure Garbled Circuits from One-Way Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9816},
  pages        = {149--178},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53015-3\_6},
  doi          = {10.1007/978-3-662-53015-3\_6},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HemenwayJOSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/HemenwayLOW16,
  author       = {Brett Hemenway and
                  Steve Lu and
                  Rafail Ostrovsky and
                  William Welser IV},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {High-Precision Secure Computation of Satellite Collision Probabilities},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {169--187},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_9},
  doi          = {10.1007/978-3-319-44618-9\_9},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/HemenwayLOW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HemenwayORR16,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky and
                  Silas Richelson and
                  Alon Rosen},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Adaptive Security with Quasi-Optimal Rate},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9562},
  pages        = {525--541},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49096-9\_22},
  doi          = {10.1007/978-3-662-49096-9\_22},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HemenwayORR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ChinburgHHS16,
  author       = {Ted Chinburg and
                  Brett Hemenway and
                  Nadia Heninger and
                  Zachary Scherr},
  title        = {Cryptographic applications of capacity theory: On the optimality of
                  Coppersmith's method for univariate polynomials},
  journal      = {CoRR},
  volume       = {abs/1605.08065},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.08065},
  eprinttype    = {arXiv},
  eprint       = {1605.08065},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ChinburgHHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HemenwayLOW16,
  author       = {Brett Hemenway and
                  Steve Lu and
                  Rafail Ostrovsky and
                  William Welser IV},
  title        = {High-precision Secure Computation of Satellite Collision Probabilities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {319},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/319},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HemenwayLOW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HemenwayO16,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky},
  title        = {Efficient Robust Secret Sharing from Expander Graphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {735},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/735},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HemenwayO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChinburgHHS16,
  author       = {Ted Chinburg and
                  Brett Hemenway and
                  Nadia Heninger and
                  Zachary Scherr},
  title        = {Cryptographic applications of capacity theory: On the optimality of
                  Coppersmith's method for univariate polynomials},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {869},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/869},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChinburgHHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/HemenwayOW15,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky and
                  Mary Wootters},
  title        = {Local correctability of expander codes},
  journal      = {Inf. Comput.},
  volume       = {243},
  pages        = {178--190},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ic.2014.12.013},
  doi          = {10.1016/J.IC.2014.12.013},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/HemenwayOW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/HemenwayW15,
  author       = {Brett Hemenway and
                  Mary Wootters},
  editor       = {Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Kazuo Iwama and
                  Naoki Kobayashi and
                  Bettina Speckmann},
  title        = {Linear-Time List Recovery of High-Rate Expander Codes},
  booktitle    = {Automata, Languages, and Programming - 42nd International Colloquium,
                  {ICALP} 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9134},
  pages        = {701--712},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47672-7\_57},
  doi          = {10.1007/978-3-662-47672-7\_57},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/HemenwayW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HemenwayOR15,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky and
                  Alon Rosen},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Non-committing Encryption from {\(\Phi\)}-hiding},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {591--608},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_24},
  doi          = {10.1007/978-3-662-46494-6\_24},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HemenwayOR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HemenwayW15,
  author       = {Brett Hemenway and
                  Mary Wootters},
  title        = {Linear-time list recovery of high-rate expander codes},
  journal      = {CoRR},
  volume       = {abs/1503.01955},
  year         = {2015},
  url          = {http://arxiv.org/abs/1503.01955},
  eprinttype    = {arXiv},
  eprint       = {1503.01955},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HemenwayW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HemenwayOR15,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky and
                  Alon Rosen},
  title        = {Non-committing encryption from {\(\Phi\)}-hiding},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HemenwayOR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HemenwayO15,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky},
  title        = {Building Lossy Trapdoor Functions from Lossy Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {156},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/156},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HemenwayO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HemenwayJOSW15,
  author       = {Brett Hemenway and
                  Zahra Jafargholi and
                  Rafail Ostrovsky and
                  Alessandra Scafuro and
                  Daniel Wichs},
  title        = {Adaptively Secure Garbled Circuits from One-Way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1250},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HemenwayJOSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HemenwayO13,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Building Lossy Trapdoor Functions from Lossy Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8270},
  pages        = {241--260},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42045-0\_13},
  doi          = {10.1007/978-3-642-42045-0\_13},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HemenwayO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/HemenwayOW13,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky and
                  Mary Wootters},
  editor       = {Fedor V. Fomin and
                  Rusins Freivalds and
                  Marta Z. Kwiatkowska and
                  David Peleg},
  title        = {Local Correctability of Expander Codes},
  booktitle    = {Automata, Languages, and Programming - 40th International Colloquium,
                  {ICALP} 2013, Riga, Latvia, July 8-12, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7965},
  pages        = {540--551},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39206-1\_46},
  doi          = {10.1007/978-3-642-39206-1\_46},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/HemenwayOW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1304-8129,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky and
                  Mary Wootters},
  title        = {Local Correctability of Expander Codes},
  journal      = {CoRR},
  volume       = {abs/1304.8129},
  year         = {2013},
  url          = {http://arxiv.org/abs/1304.8129},
  eprinttype    = {arXiv},
  eprint       = {1304.8129},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1304-8129.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ita/GilbertHRSW12,
  author       = {Anna C. Gilbert and
                  Brett Hemenway and
                  Atri Rudra and
                  Martin J. Strauss and
                  Mary Wootters},
  title        = {Recovering simple signals},
  booktitle    = {2012 Information Theory and Applications Workshop, {ITA} 2012, San
                  Diego, CA, USA, February 5-10, 2012},
  pages        = {382--391},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ITA.2012.6181772},
  doi          = {10.1109/ITA.2012.6181772},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ita/GilbertHRSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HemenwayO12,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {On Homomorphic Encryption and Chosen-Ciphertext Security},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {52--65},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_4},
  doi          = {10.1007/978-3-642-30057-8\_4},
  timestamp    = {Mon, 16 Nov 2020 15:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/HemenwayO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HemenwayLO12,
  author       = {Brett Hemenway and
                  Steve Lu and
                  Rafail Ostrovsky},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Correlated Product Security from Any One-Way Function},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {558--575},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_33},
  doi          = {10.1007/978-3-642-30057-8\_33},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/HemenwayLO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HemenwayO12a,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Extended-DDH and Lossy Trapdoor Functions},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {627--643},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_37},
  doi          = {10.1007/978-3-642-30057-8\_37},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HemenwayO12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssp/GilbertHSWW12,
  author       = {Anna C. Gilbert and
                  Brett Hemenway and
                  Martin J. Strauss and
                  David P. Woodruff and
                  Mary Wootters},
  title        = {Reusable low-error compressive sampling schemes through privacy},
  booktitle    = {{IEEE} Statistical Signal Processing Workshop, {SSP} 2012, Ann Arbor,
                  MI, USA, August 5-8, 2012},
  pages        = {536--539},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/SSP.2012.6319752},
  doi          = {10.1109/SSP.2012.6319752},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/ssp/GilbertHSWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/approx/HemenwayOSW11,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky and
                  Martin J. Strauss and
                  Mary Wootters},
  editor       = {Leslie Ann Goldberg and
                  Klaus Jansen and
                  R. Ravi and
                  Jos{\'{e}} D. P. Rolim},
  title        = {Public Key Locally Decodable Codes with Short Keys},
  booktitle    = {Approximation, Randomization, and Combinatorial Optimization. Algorithms
                  and Techniques - 14th International Workshop, {APPROX} 2011, and 15th
                  International Workshop, {RANDOM} 2011, Princeton, NJ, USA, August
                  17-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6845},
  pages        = {605--615},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22935-0\_51},
  doi          = {10.1007/978-3-642-22935-0\_51},
  timestamp    = {Tue, 21 Sep 2021 09:36:24 +0200},
  biburl       = {https://dblp.org/rec/conf/approx/HemenwayOSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HemenwayLOV11,
  author       = {Brett Hemenway and
                  Beno{\^{\i}}t Libert and
                  Rafail Ostrovsky and
                  Damien Vergnaud},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {Lossy Encryption: Constructions from General Assumptions and Efficient
                  Selective Opening Chosen Ciphertext Security},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {70--88},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_4},
  doi          = {10.1007/978-3-642-25385-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HemenwayLOV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/HemenwayOSW11,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky and
                  Martin Strauss and
                  Mary Wootters},
  title        = {Public Key Locally Decodable Codes with Short Keys},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR11-118}},
  year         = {2011},
  url          = {https://eccc.weizmann.ac.il/report/2011/118},
  eprinttype    = {ECCC},
  eprint       = {TR11-118},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/HemenwayOSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/HemenwayO10,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky},
  title        = {Building Injective Trapdoor Functions From Oblivious Transfer},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR10-127}},
  year         = {2010},
  url          = {https://eccc.weizmann.ac.il/report/2010/127},
  eprinttype    = {ECCC},
  eprint       = {TR10-127},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/HemenwayO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HemenwayO10,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky},
  title        = {Homomorphic Encryption Over Cyclic Groups Implies Chosen-Ciphertext
                  Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HemenwayO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HemenwayLO10,
  author       = {Brett Hemenway and
                  Steve Lu and
                  Rafail Ostrovsky},
  title        = {Correlated Product Security From Any One-Way Function and the New
                  Notion of Decisional Correlated Product Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {100},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/100},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HemenwayLO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/HemenwayO09,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky},
  title        = {Lossy Trapdoor Functions from Smooth Homomorphic Hash Proof Systems},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR09-127}},
  year         = {2009},
  url          = {https://eccc.weizmann.ac.il/report/2009/127},
  eprinttype    = {ECCC},
  eprint       = {TR09-127},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/HemenwayO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HemenwayLOV09,
  author       = {Brett Hemenway and
                  Beno{\^{\i}}t Libert and
                  Rafail Ostrovsky and
                  Damien Vergnaud},
  title        = {Lossy Encryption: Constructions from General Assumptions and Efficient
                  Selective Opening Chosen Ciphertext Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {88},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HemenwayLOV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HemenwayO08,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky},
  editor       = {David A. Wagner},
  title        = {Public-Key Locally-Decodable Codes},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2008, 28th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5157},
  pages        = {126--143},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85174-5\_8},
  doi          = {10.1007/978-3-540-85174-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HemenwayO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/HemenwayO07,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky},
  title        = {Public Key Encryption Which is Simultaneously a Locally-Decodable
                  Error-Correcting Code},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR07-021}},
  year         = {2007},
  url          = {https://eccc.weizmann.ac.il/eccc-reports/2007/TR07-021/index.html},
  eprinttype    = {ECCC},
  eprint       = {TR07-021},
  timestamp    = {Wed, 28 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/HemenwayO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HemenwayO07,
  author       = {Brett Hemenway and
                  Rafail Ostrovsky},
  title        = {Public Key Encryption Which is Simultaneously a Locally-Decodable
                  Error-Correcting Code},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/083},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HemenwayO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics