Author of the publication

Faster Secure Comparisons with Offline Phase for Efficient Private Set Intersection.

, , and . NDSS, The Internet Society, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computation on Encrypted Data Using Dataflow Authentication., , , , , and . ACM Trans. Priv. Secur., 25 (3): 21:1-21:36 (2022)Trifecta: Faster High-Throughput Three-Party Computation over WAN Using Multi-Fan-In Logic Gates., and . Proc. Priv. Enhancing Technol., 2023 (4): 224-237 (October 2023)Waffle: An Online Oblivious Datastore for Protecting Data Access Patterns., , , , and . Proc. ACM Manag. Data, 1 (4): 266:1-266:25 (December 2023)Secure Multi-party Computation of Differentially Private Heavy Hitters., and . CCS, page 2361-2377. ACM, (2021)EncDBDB: Searchable Encrypted, Fast, Compressed, In-Memory Database Using Enclaves., , and . DSN, page 438-450. IEEE, (2021)Leveraging Optimization for Adaptive Attacks on Image Watermarks., , , and . CoRR, (2023)Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions., , , , , , , , , and 2 other author(s). CoRR, (2023)IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization., and . USENIX Security Symposium, page 2407-2424. USENIX Association, (2022)Constant-weight PIR: Single-round Keyword PIR via Constant-weight Equality Operators., and . USENIX Security Symposium, page 1723-1740. USENIX Association, (2022)Deep Neural Network Fingerprinting by Conferrable Adversarial Examples., , and . CoRR, (2019)