brett hemenway falk
brett hemenway falk
Verified email at cis.upenn.edu - Homepage
Title
Cited by
Cited by
Year
Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security
B Hemenway, B Libert, R Ostrovsky, D Vergnaud
International Conference on the Theory and Application of Cryptology andá…, 2011
1022011
Extended-DDH and lossy trapdoor functions
B Hemenway, R Ostrovsky
International Workshop on Public Key Cryptography, 627-643, 2012
75*2012
Sok: General purpose compilers for secure multi-party computation
M Hastings, B Hemenway, D Noble, S Zdancewic
2019 IEEE symposium on security and privacy (SP), 1220-1237, 2019
602019
Adaptively secure garbled circuits from one-way functions
B Hemenway, Z Jafargholi, R Ostrovsky, A Scafuro, D Wichs
Annual International Cryptology Conference, 149-178, 2016
462016
Public-key locally-decodable codes
B Hemenway, R Ostrovsky
Advances in Cryptology–CRYPTO 2008, 126-143, 2008
39*2008
Recovering simple signals
AC Gilbert, B Hemenway, A Rudra, MJ Strauss, M Wootters
2012 Information Theory and Applications Workshop, 382-391, 2012
362012
Local correctability of expander codes
B Hemenway, R Ostrovsky, M Wootters
Information and Computation 243, 178-190, 2015
352015
Token-weighted crowdsourcing
G Tsoukalas, BH Falk
Management Science 66 (9), 3843-3859, 2020
33*2020
On homomorphic encryption and chosen-ciphertext security
B Hemenway, R Ostrovsky
International Workshop on Public Key Cryptography, 52-65, 2012
28*2012
Local list recovery of high-rate tensor codes and applications
B Hemenway, N Ron-Zewi, M Wootters
SIAM Journal on Computing 49 (4), FOCS17-157-FOCS17-195, 2019
272019
High-precision secure computation of satellite collision probabilities
B Hemenway, S Lu, R Ostrovsky, W Welser Iv
International Conference on Security and Cryptography for Networks, 169-187, 2016
272016
Building lossy trapdoor functions from lossy encryption
B Hemenway, R Ostrovsky
International Conference on the Theory and Application of Cryptology andá…, 2013
25*2013
Linear-time list recovery of high-rate expander codes
B Hemenway, M Wootters
Information and Computation 261, 202-218, 2018
232018
Non-committing encryption from Φ-hiding
B Hemenway, R Ostrovsky, A Rosen
Theory of Cryptography Conference, 591-608, 2015
212015
Satellite anomalies: Benefits of a centralized anomaly database and methods for securely sharing information among satellite operators
DA Galvan, B Hemenway, IV Welser, D Baiocchi
RAND NATIONAL DEFENSE RESEARCH INST SANTA MONICA CA, 2014
212014
Global brain dynamics during social exclusion predict subsequent behavioral conformity
N Wasylyshyn, B Hemenway Falk, JO Garcia, CN Cascio, MB O’Donnell, ...
Social Cognitive and Affective Neuroscience 13 (2), 182-191, 2018
202018
Private Set Intersection with Linear Communication from General Assumptions.
BH Falk, D Noble, R Ostrovsky
IACR Cryptol. ePrint Arch. 2018, 238, 2018
152018
Public key locally decodable codes with short keys
B Hemenway, R Ostrovsky, MJ Strauss, M Wootters
Approximation, Randomization, and Combinatorial Optimization. Algorithms andá…, 2011
152011
Sensitivity and computational complexity in financial networks
B Hemenway, S Khanna
Algorithmic Finance 5 (3-4), 95-110, 2016
142016
Adaptive security with quasi-optimal rate
B Hemenway, R Ostrovsky, S Richelson, A Rosen
Theory of Cryptography Conference, 525-541, 2016
102016
The system can't perform the operation now. Try again later.
Articles 1–20