Follow
brett hemenway falk
brett hemenway falk
Verified email at cis.upenn.edu - Homepage
Title
Cited by
Cited by
Year
Sok: General purpose compilers for secure multi-party computation
M Hastings, B Hemenway, D Noble, S Zdancewic
2019 IEEE symposium on security and privacy (SP), 1220-1237, 2019
1642019
Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security
B Hemenway, B Libert, R Ostrovsky, D Vergnaud
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
1202011
Token-weighted crowdsourcing
G Tsoukalas, BH Falk
Management Science 66 (9), 3843-3859, 2020
83*2020
Extended-DDH and lossy trapdoor functions
B Hemenway, R Ostrovsky
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
81*2012
Adaptively secure garbled circuits from one-way functions
B Hemenway, Z Jafargholi, R Ostrovsky, A Scafuro, D Wichs
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
612016
Honeycrisp: large-scale differentially private aggregation without a trusted core
E Roth, D Noble, BH Falk, A Haeberlen
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 196-210, 2019
482019
High-precision secure computation of satellite collision probabilities
B Hemenway, S Lu, R Ostrovsky, W Welser Iv
Security and Cryptography for Networks: 10th International Conference, SCN …, 2016
472016
Private set intersection with linear communication from general assumptions
B Hemenway Falk, D Noble, R Ostrovsky
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 14-25, 2019
452019
Local correctability of expander codes
B Hemenway, R Ostrovsky, M Wootters
Information and Computation 243, 178-190, 2015
452015
Recovering simple signals
AC Gilbert, B Hemenway, A Rudra, MJ Strauss, M Wootters
2012 Information Theory and Applications Workshop, 382-391, 2012
442012
Public-key locally-decodable codes
B Hemenway, R Ostrovsky
Advances in Cryptology–CRYPTO 2008, 126-143, 2008
44*2008
Local list recovery of high-rate tensor codes and applications
B Hemenway, N Ron-Zewi, M Wootters
SIAM Journal on Computing 49 (4), FOCS17-157-FOCS17-195, 2019
392019
Global brain dynamics during social exclusion predict subsequent behavioral conformity
N Wasylyshyn, B Hemenway Falk, JO Garcia, CN Cascio, MB O’Donnell, ...
Social Cognitive and Affective Neuroscience 13 (2), 182-191, 2018
382018
On homomorphic encryption and chosen-ciphertext security
B Hemenway, R Ostrovsky
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
32*2012
Linear-time list recovery of high-rate expander codes
B Hemenway, M Wootters
Information and Computation 261, 202-218, 2018
312018
Building lossy trapdoor functions from lossy encryption
B Hemenway, R Ostrovsky
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
30*2013
Non-committing encryption from -hiding
B Hemenway, R Ostrovsky, A Rosen
Cryptology ePrint Archive, 2015
262015
Satellite anomalies: Benefits of a centralized anomaly database and methods for securely sharing information among satellite operators
DA Galvan, B Hemenway, IV Welser, D Baiocchi
RAND NATIONAL DEFENSE RESEARCH INST SANTA MONICA CA, 2014
252014
Sensitivity and computational complexity in financial networks
B Hemenway, S Khanna
Algorithmic Finance 5 (3-4), 95-110, 2016
232016
Public key locally decodable codes with short keys
B Hemenway, R Ostrovsky, MJ Strauss, M Wootters
Approximation, Randomization, and Combinatorial Optimization. Algorithms and …, 2011
192011
The system can't perform the operation now. Try again later.
Articles 1–20