Follow
Elette Boyle
Elette Boyle
Unknown affiliation
Verified email at mit.edu
Title
Cited by
Cited by
Year
Functional signatures and pseudorandom functions
E Boyle, S Goldwasser, I Ivan
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
4072014
Function secret sharing
E Boyle, N Gilboa, Y Ishai
Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015
2352015
On extractability obfuscation
E Boyle, KM Chung, R Pass
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014 …, 2014
2072014
Function secret sharing: Improvements and extensions
E Boyle, N Gilboa, Y Ishai
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1762016
Fully leakage-resilient signatures
E Boyle, G Segev, D Wichs
Journal of cryptology 26 (3), 513-558, 2013
1382013
Breaking the circuit size barrier for secure computation under DDH
E Boyle, N Gilboa, Y Ishai
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
1332016
Efficient pseudorandom correlation generators: Silent OT extension and more
E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Scholl
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
1232019
Efficient two-round OT extension and silent non-interactive secure computation
E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Rindal, P Scholl
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
1092019
Oblivious parallel RAM and applications
E Boyle, KM Chung, R Pass
Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2015
1092015
Compressing vector OLE
E Boyle, G Couteau, N Gilboa, Y Ishai
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
862018
Limits of extractability assumptions with distributional auxiliary input
E Boyle, R Pass
Advances in Cryptology–ASIACRYPT 2015: 21st International Conference on the …, 2015
842015
Zero-knowledge proofs on secret-shared data via fully linear PCPs
D Boneh, E Boyle, H Corrigan-Gibbs, N Gilboa, Y Ishai
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
742019
Group-based secure computation: optimizing rounds, communication, and computation
E Boyle, N Gilboa, Y Ishai
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
732017
Is there an oblivious RAM lower bound?
E Boyle, M Naor
Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016
692016
Foundations of homomorphic secret sharing
E Boyle, N Gilboa, Y Ishai, H Lin, S Tessaro
Cryptology ePrint Archive, 2017
682017
Large-scale secure computation: Multi-party computation for (parallel) RAM programs
E Boyle, KM Chung, R Pass
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
68*2015
Communication locality in secure multi-party computation: how to run sublinear algorithms in a distributed setting
E Boyle, S Goldwasser, S Tessaro
Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013
672013
Homomorphic secret sharing: optimizations and applications
E Boyle, G Couteau, N Gilboa, Y Ishai, M Orrų
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
592017
Multiparty computation secure against continual memory leakage
E Boyle, S Goldwasser, A Jain, YT Kalai
Proceedings of the forty-fourth annual ACM symposium on Theory of computing …, 2012
532012
Efficient pseudorandom correlation generators from ring-LPN
E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Scholl
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
512020
The system can't perform the operation now. Try again later.
Articles 1–20