brett hemenway falk
brett hemenway falk
Verifierad e-postadress på cis.upenn.edu - Startsida
Titel
Citeras av
Citeras av
År
Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security
B Hemenway, B Libert, R Ostrovsky, D Vergnaud
International Conference on the Theory and Application of Cryptology and …, 2011
962011
Extended-DDH and lossy trapdoor functions
B Hemenway, R Ostrovsky
International Workshop on Public Key Cryptography, 627-643, 2012
73*2012
Adaptively secure garbled circuits from one-way functions
B Hemenway, Z Jafargholi, R Ostrovsky, A Scafuro, D Wichs
Annual International Cryptology Conference, 149-178, 2016
422016
Sok: General purpose compilers for secure multi-party computation
M Hastings, B Hemenway, D Noble, S Zdancewic
2019 IEEE Symposium on Security and Privacy (SP), 1220-1237, 2019
362019
Public-key locally-decodable codes
B Hemenway, R Ostrovsky
Advances in Cryptology–CRYPTO 2008, 126-143, 2008
36*2008
Local correctability of expander codes
B Hemenway, R Ostrovsky, M Wootters
Information and Computation 243, 178-190, 2015
332015
Recovering simple signals
AC Gilbert, B Hemenway, A Rudra, MJ Strauss, M Wootters
2012 Information Theory and Applications Workshop, 382-391, 2012
312012
On homomorphic encryption and chosen-ciphertext security
B Hemenway, R Ostrovsky
International Workshop on Public Key Cryptography, 52-65, 2012
27*2012
Building lossy trapdoor functions from lossy encryption
B Hemenway, R Ostrovsky
International Conference on the Theory and Application of Cryptology and …, 2013
24*2013
Local list recovery of high-rate tensor codes and applications
B Hemenway, N Ron-Zewi, M Wootters
SIAM Journal on Computing, FOCS17-157-FOCS17-195, 2019
212019
Linear-time list recovery of high-rate expander codes
B Hemenway, M Wootters
Information and Computation 261, 202-218, 2018
202018
High-precision secure computation of satellite collision probabilities
B Hemenway, S Lu, R Ostrovsky, W Welser Iv
International Conference on Security and Cryptography for Networks, 169-187, 2016
202016
Non-committing encryption from Φ-hiding
B Hemenway, R Ostrovsky, A Rosen
Theory of Cryptography Conference, 591-608, 2015
182015
Global brain dynamics during social exclusion predict subsequent behavioral conformity
N Wasylyshyn, B Hemenway Falk, JO Garcia, CN Cascio, MB O’Donnell, ...
Social cognitive and affective neuroscience 13 (2), 182-191, 2018
172018
Private Set Intersection with Linear Communication from General Assumptions.
BH Falk, D Noble, R Ostrovsky
IACR Cryptol. ePrint Arch. 2018, 238, 2018
162018
Satellite anomalies: Benefits of a centralized anomaly database and methods for securely sharing information among satellite operators
DA Galvan, B Hemenway, IV Welser, D Baiocchi
RAND NATIONAL DEFENSE RESEARCH INST SANTA MONICA CA, 2014
162014
Public key locally decodable codes with short keys
B Hemenway, R Ostrovsky, MJ Strauss, M Wootters
Approximation, Randomization, and Combinatorial Optimization. Algorithms and …, 2011
142011
Token-weighted crowdsourcing
G Tsoukalas, BH Falk
Management Science 66 (9), 3843-3859, 2020
122020
Sensitivity and computational complexity in financial networks
B Hemenway, S Khanna
Algorithmic Finance 5 (3-4), 95-110, 2016
122016
Token weighted crowdsourcing
BH Falk, G Tsoukalas
Working Paper, 2018
92018
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20