Publications

OptORAMa: Optimal Oblivious RAM

PDF

A Lower Bound for Adaptively-Secure Collective Coin-Flipping Protocols

DISC 2018

PDF Conference

On Distributional Collision Resistant Hashing

CRYPTO 2018

PDF Conference Video

On the Complexity of Compressing Obfuscation

CRYPTO 2018

PDF Conference Video

Non-Trivial Witness Encryption and Null-iO from Standard Assumptions

SCN 2018

PDF Conference

Another Step Towards Realizing Random Oracles: Non-Malleable Point Obfuscation

EUROCRYPT 2018

PDF Conference

Collision Resistant Hashing for Paranoids: Dealing with Multiple Collisions

EUROCRYPT 2018

PDF Conference

Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation)

EUROCRYPT 2018

PDF Conference

Evolving Secret Sharing: Dynamic Thresholds and Robustness

TCC 2017

PDF Conference

Non-Interactive Multiparty Computation Without Correlated Randomness

ASIACRYPT 2017

PDF Conference

White-Box vs. Black-Box Complexity of Search Problems: Ramsey and Graph Property Testing

FOCS 2017
Accepted to the Journal of the ACM (JACM)

PDF Conference Video

Be Adaptive, Avoid Overcommitting

CRYPTO 2017

PDF Conference Video

From Minicrypt to Obfustopia via Private-Key Functional Encryption

EUROCRYPT 2017

PDF Conference

Threshold Secret Sharing Requires a Linear Size Alphabet

TCC 2016-B

PDF Conference

Leakage Resilient One-Way Functions: The Auxiliary-Input Setting

TCC 2016-B
Theoretical Computer Science 2018

PDF Conference Journal

How to Share a Secret, Infinitely

TCC 2016-B
IEEE Transactions on Information Theory 2017

PDF Conference Journal Video

Multi-Input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions

EUROCRYPT 2016
Journal of Cryptology 2017

PDF Conference Journal Video

Cutting-Edge Cryptography Through the Lens of Secret Sharing

TCC 2016-A
Information and Computation 2018

PDF Conference Journal

Communication with Contextual Uncertainty

SODA 2016
Computational Complexity 2017

PDF Conference Journal

Compressing Communication in Distributed Protocols

DISC 2015

PDF Conference

Negation-Limited Formulas

RANDOM 2015
Theoretical Computer Science 2017

PDF Conference Journal

Strong Locally Testable Codes with Relaxed Local Decoders

CCC 2015

PDF Conference

Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions

TCC 2015
Journal of Cryptology 2018

PDF Conference Journal

One-Way Functions and (Im)perfect Obfuscation

FOCS 2014

PDF Conference Video

Secret-Sharing for NP

ASIACRYPT 2014
Journal of Cryptology 2016

PDF Conference Journal

Hardness Preserving Reductions via Cuckoo Hashing

TCC 2013
Journal of Cryptology 2018

PDF Conference Journal

On the Noise Stability of Small De Morgan Formulas

PDF

Improved Average-Case Lower Bounds for DeMorgan Formula Size

FOCS 2013
SIAM Journal on Computing (SICOMP) 2017

PDF Conference Journal Video

Average-Case Lower Bounds for Formula Size

STOC 2013

PDF Conference

Contact