Functional signatures and pseudorandom functions E Boyle, S Goldwasser, I Ivan Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014 | 407 | 2014 |
Function secret sharing E Boyle, N Gilboa, Y Ishai Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015 | 235 | 2015 |
On extractability obfuscation E Boyle, KM Chung, R Pass Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014 …, 2014 | 207 | 2014 |
Function secret sharing: Improvements and extensions E Boyle, N Gilboa, Y Ishai Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 176 | 2016 |
Fully leakage-resilient signatures E Boyle, G Segev, D Wichs Journal of cryptology 26 (3), 513-558, 2013 | 138 | 2013 |
Breaking the circuit size barrier for secure computation under DDH E Boyle, N Gilboa, Y Ishai Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016 | 133 | 2016 |
Efficient pseudorandom correlation generators: Silent OT extension and more E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Scholl Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 123 | 2019 |
Efficient two-round OT extension and silent non-interactive secure computation E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Rindal, P Scholl Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 109 | 2019 |
Oblivious parallel RAM and applications E Boyle, KM Chung, R Pass Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2015 | 109 | 2015 |
Compressing vector OLE E Boyle, G Couteau, N Gilboa, Y Ishai Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 86 | 2018 |
Limits of extractability assumptions with distributional auxiliary input E Boyle, R Pass Advances in Cryptology–ASIACRYPT 2015: 21st International Conference on the …, 2015 | 84 | 2015 |
Zero-knowledge proofs on secret-shared data via fully linear PCPs D Boneh, E Boyle, H Corrigan-Gibbs, N Gilboa, Y Ishai Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 74 | 2019 |
Group-based secure computation: optimizing rounds, communication, and computation E Boyle, N Gilboa, Y Ishai Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017 | 73 | 2017 |
Is there an oblivious RAM lower bound? E Boyle, M Naor Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016 | 69 | 2016 |
Foundations of homomorphic secret sharing E Boyle, N Gilboa, Y Ishai, H Lin, S Tessaro Cryptology ePrint Archive, 2017 | 68 | 2017 |
Large-scale secure computation: Multi-party computation for (parallel) RAM programs E Boyle, KM Chung, R Pass Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015 | 68* | 2015 |
Communication locality in secure multi-party computation: how to run sublinear algorithms in a distributed setting E Boyle, S Goldwasser, S Tessaro Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013 | 67 | 2013 |
Homomorphic secret sharing: optimizations and applications E Boyle, G Couteau, N Gilboa, Y Ishai, M Orrù Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 59 | 2017 |
Multiparty computation secure against continual memory leakage E Boyle, S Goldwasser, A Jain, YT Kalai Proceedings of the forty-fourth annual ACM symposium on Theory of computing …, 2012 | 53 | 2012 |
Efficient pseudorandom correlation generators from ring-LPN E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Scholl Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 51 | 2020 |