Name
Affiliation
Papers
ELETTE BOYLE
Cornell Univ, Ithaca, NY 14853 USA
44
Collaborators
Citations 
PageRank 
52
261
19.30
Referers 
Referees 
References 
447
449
573
Search Limit
100449
Title
Citations
PageRank
Year
Low-Complexity Weak Pseudorandom Functions In Ac0[Mod2]00.342021
Breaking the O(√ n)-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party00.342021
Lightweight Techniques for Private Heavy Hitters20.362021
Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation00.342021
Sublinear Gmw-Style Compiler For Mpc With Preprocessing10.352021
Succinctly Reconstructed Distributed Signatures and Balanced Byzantine Agreement00.342020
Cryptography from Information Loss.00.342020
Efficient Pseudorandom Correlation Generators from Ring-LPN.00.342020
How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs.00.342019
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs00.342019
Efficient Pseudorandom Correlation Generators: Silent OT Extension and More.20.352019
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation.20.362019
Adversarially Robust Property-Preserving Hash Functions.00.342019
Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs.00.342019
Homomorphic Secret Sharing from Lattices Without FHE.10.352019
Permuted Puzzles and Cryptographic Hardness.00.342019
Compressing Vector OLE.10.352019
Limits of Practical Sublinear Secure Computation.00.342018
Must the Communication Graph of MPC Protocols be an Expander?00.342018
Securing Abe's Mix-net Against Malicious Verifiers via Witness Indistinguishability.00.342018
Exploring the Boundaries of Topology-Hiding Computation.20.382018
The Bottleneck Complexity of Secure Multiparty Computation.00.342018
Function Secret Sharing: Improvements and Extensions.60.422018
Recent Advances in Function and Homomorphic Secret Sharing - (Invited Talk).00.342017
Foundations of Homomorphic Secret Sharing.30.392017
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation.70.422017
Homomorphic Secret Sharing: Optimizations and Applications.00.342017
Can We Access a Database Both Locally and Privately?00.342017
Is There An Oblivious Ram Lower Bound?80.462016
Oblivious Parallel RAM and Applications.190.632016
Breaking the Circuit Size Barrier for Secure Computation Under DDH.120.512016
Limits of Extractability Assumptions with Distributional Auxiliary Input.190.602015
Function Secret Sharing.361.092015
Large-Scale Secure Computation: Multi-Party Computation For (Parallel) Ram Programs160.642015
Oblivious Parallel RAM.80.482014
Large-Scale Secure Computation.20.372014
On Extractability Obfuscation.00.342014
Secure Computation against Adaptive Auxiliary Information.130.522013
Limits of Extractability Assumptions with Distributional Auxiliary Input.140.512013
Communication locality in secure multi-party computation: how to run sublinear algorithms in a distributed setting230.722013
Multiparty computation secure against continual memory leakage290.892012
Fully Leakage-Resilient Signatures270.902011
Leakage-resilient coin tossing70.462011
Sequential entry in many-to-one matching markets10.382009