Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys N Fleischhacker, J Krupp, G Malavolta, J Schneider, D Schröder, ... Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016 | 84 | 2016 |
Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures D Aggarwal, I Damgård, JB Nielsen, M Obremski, E Purwanto, J Ribeiro, ... Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 81 | 2019 |
The communication complexity of threshold private set intersection S Ghosh, M Simkin Annual International Cryptology Conference, 3-29, 2019 | 70 | 2019 |
Caulk: Lookup arguments in sublinear time A Zapico, V Buterin, D Khovratovich, M Maller, A Nitulescu, M Simkin Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 61 | 2022 |
Yet another compiler for active security or: Efficient MPC over arbitrary rings I Damgård, C Orlandi, M Simkin Annual International Cryptology Conference, 799-829, 2018 | 55 | 2018 |
Use your brain! Arithmetic 3PC for any modulus with active security H Eerikson, M Keller, C Orlandi, P Pullonen, J Puura, M Simkin Cryptology ePrint Archive, 2019 | 44 | 2019 |
Nearly optimal verifiable data streaming J Krupp, D Schröder, M Simkin, D Fiore, G Ateniese, S Nürnberger Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016 | 42 | 2016 |
VeriStream–a framework for verifiable data streaming D Schöder, M Simkin Financial Cryptography and Data Security: 19th International Conference, FC …, 2015 | 39 | 2015 |
Lower bounds for leakage-resilient secret sharing JB Nielsen, M Simkin Annual International Conference on the Theory and Applications of …, 2020 | 38 | 2020 |
Squirrel: efficient synchronized multi-signatures from lattices N Fleischhacker, M Simkin, Z Zhang Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 27 | 2022 |
Continuously non-malleable codes with split-state refresh A Faonio, JB Nielsen, M Simkin, D Venturi Theoretical Computer Science 759, 98-132, 2019 | 25 | 2019 |
Non-malleable secret sharing against bounded joint-tampering attacks in the plain model G Brian, A Faonio, M Obremski, M Simkin, D Venturi Annual International Cryptology Conference, 127-155, 2020 | 23 | 2020 |
Lower bounds for multi-server oblivious RAMs KG Larsen, M Simkin, K Yeo Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020 | 23 | 2020 |
Optimal Oblivious Priority Queues and Offline Oblivious RAM. Z Jafargholi, KG Larsen, M Simkin IACR Cryptol. ePrint Arch. 2019, 237, 2019 | 21* | 2019 |
Multiparty computation with covert security and public verifiability P Scholl, M Simkin, L Siniscalchi Cryptology ePrint Archive, 2021 | 20 | 2021 |
Laconic private set-intersection from pairings DF Aranha, C Lin, C Orlandi, M Simkin Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 19 | 2022 |
Compact zero-knowledge proofs of small hamming weight I Damgård, J Luo, S Oechsner, P Scholl, M Simkin Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018 | 19 | 2018 |
Black-box transformations from passive to covert security with public verifiability I Damgård, C Orlandi, M Simkin Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 17 | 2020 |
WebTrust–a comprehensive authenticity and integrity framework for HTTP M Backes, RW Gerling, S Gerling, S Nürnberger, D Schröder, M Simkin Applied Cryptography and Network Security: 12th International Conference …, 2014 | 15 | 2014 |
How to compress encrypted data N Fleischhacker, KG Larsen, M Simkin Annual International Conference on the Theory and Applications of …, 2023 | 13 | 2023 |