Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys N Fleischhacker, J Krupp, G Malavolta, J Schneider, D Schröder, ... Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016 | 83 | 2016 |
Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures D Aggarwal, I Damgård, JB Nielsen, M Obremski, E Purwanto, J Ribeiro, ... Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 80 | 2019 |
The communication complexity of threshold private set intersection S Ghosh, M Simkin Annual International Cryptology Conference, 3-29, 2019 | 68 | 2019 |
Caulk: Lookup arguments in sublinear time A Zapico, V Buterin, D Khovratovich, M Maller, A Nitulescu, M Simkin Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 55 | 2022 |
Yet another compiler for active security or: Efficient MPC over arbitrary rings I Damgård, C Orlandi, M Simkin Annual International Cryptology Conference, 799-829, 2018 | 54 | 2018 |
Use your brain! Arithmetic 3PC for any modulus with active security H Eerikson, M Keller, C Orlandi, P Pullonen, J Puura, M Simkin Cryptology ePrint Archive, 2019 | 41 | 2019 |
Nearly optimal verifiable data streaming J Krupp, D Schröder, M Simkin, D Fiore, G Ateniese, S Nürnberger Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016 | 41 | 2016 |
Lower bounds for leakage-resilient secret sharing JB Nielsen, M Simkin Annual International Conference on the Theory and Applications of …, 2020 | 38 | 2020 |
VeriStream–a framework for verifiable data streaming D Schöder, M Simkin Financial Cryptography and Data Security: 19th International Conference, FC …, 2015 | 38 | 2015 |
Continuously non-malleable codes with split-state refresh A Faonio, JB Nielsen, M Simkin, D Venturi Theoretical Computer Science 759, 98-132, 2019 | 25 | 2019 |
Squirrel: efficient synchronized multi-signatures from lattices N Fleischhacker, M Simkin, Z Zhang Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 24 | 2022 |
Lower bounds for multi-server oblivious RAMs KG Larsen, M Simkin, K Yeo Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020 | 23 | 2020 |
Non-malleable secret sharing against bounded joint-tampering attacks in the plain model G Brian, A Faonio, M Obremski, M Simkin, D Venturi Annual International Cryptology Conference, 127-155, 2020 | 22 | 2020 |
Optimal Oblivious Priority Queues and Offline Oblivious RAM. Z Jafargholi, KG Larsen, M Simkin IACR Cryptol. ePrint Arch. 2019, 237, 2019 | 21* | 2019 |
Multiparty computation with covert security and public verifiability P Scholl, M Simkin, L Siniscalchi Cryptology ePrint Archive, 2021 | 20 | 2021 |
Compact zero-knowledge proofs of small hamming weight I Damgård, J Luo, S Oechsner, P Scholl, M Simkin Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018 | 19 | 2018 |
Laconic private set-intersection from pairings DF Aranha, C Lin, C Orlandi, M Simkin Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 17 | 2022 |
Black-box transformations from passive to covert security with public verifiability I Damgård, C Orlandi, M Simkin Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 17 | 2020 |
WebTrust–a comprehensive authenticity and integrity framework for HTTP M Backes, RW Gerling, S Gerling, S Nürnberger, D Schröder, M Simkin Applied Cryptography and Network Security: 12th International Conference …, 2014 | 15 | 2014 |
Functional credentials D Deuber, M Maffei, G Malavolta, M Rabkin, D Schröder, M Simkin Proceedings on Privacy Enhancing Technologies, 2018 | 13 | 2018 |