Sok: General purpose compilers for secure multi-party computation M Hastings, B Hemenway, D Noble, S Zdancewic 2019 IEEE symposium on security and privacy (SP), 1220-1237, 2019 | 214 | 2019 |
Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security B Hemenway, B Libert, R Ostrovsky, D Vergnaud Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011 | 131 | 2011 |
Token-weighted crowdsourcing G Tsoukalas, BH Falk Management Science 66 (9), 3843-3859, 2020 | 112* | 2020 |
Extended-DDH and lossy trapdoor functions B Hemenway, R Ostrovsky International Workshop on Public Key Cryptography, 627-643, 2012 | 87* | 2012 |
Honeycrisp: large-scale differentially private aggregation without a trusted core E Roth, D Noble, BH Falk, A Haeberlen Proceedings of the 27th ACM Symposium on Operating Systems Principles, 196-210, 2019 | 67 | 2019 |
Adaptively secure garbled circuits from one-way functions B Hemenway, Z Jafargholi, R Ostrovsky, A Scafuro, D Wichs Annual International Cryptology Conference, 149-178, 2016 | 63 | 2016 |
Private set intersection with linear communication from general assumptions B Hemenway Falk, D Noble, R Ostrovsky Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 14-25, 2019 | 61 | 2019 |
High-precision secure computation of satellite collision probabilities B Hemenway, S Lu, R Ostrovsky, W Welser Iv Security and Cryptography for Networks: 10th International Conference, SCN …, 2016 | 58 | 2016 |
Local correctability of expander codes B Hemenway, R Ostrovsky, M Wootters Information and Computation 243, 178-190, 2015 | 49 | 2015 |
Public-key locally-decodable codes B Hemenway, R Ostrovsky Advances in Cryptology–CRYPTO 2008, 126-143, 2008 | 48* | 2008 |
Local list recovery of high-rate tensor codes and applications B Hemenway, N Ron-Zewi, M Wootters SIAM Journal on Computing 49 (4), FOCS17-157-FOCS17-195, 2019 | 47 | 2019 |
Global brain dynamics during social exclusion predict subsequent behavioral conformity N Wasylyshyn, B Hemenway Falk, JO Garcia, CN Cascio, MB O’Donnell, ... Social Cognitive and Affective Neuroscience 13 (2), 182-191, 2018 | 47 | 2018 |
Recovering simple signals AC Gilbert, B Hemenway, A Rudra, MJ Strauss, M Wootters 2012 Information Theory and Applications Workshop, 382-391, 2012 | 47 | 2012 |
Scaling blockchains: Can committee-based consensus help? A Benhaim, BH Falk, G Tsoukalas Management Science 69 (11), 6525-6539, 2023 | 36* | 2023 |
Linear-time list recovery of high-rate expander codes B Hemenway, M Wootters Information and Computation 261, 202-218, 2018 | 35 | 2018 |
Building lossy trapdoor functions from lossy encryption B Hemenway, R Ostrovsky Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 32* | 2013 |
On homomorphic encryption and chosen-ciphertext security B Hemenway, R Ostrovsky International workshop on public key cryptography, 52-65, 2012 | 31* | 2012 |
Sensitivity and computational complexity in financial networks B Hemenway, S Khanna Algorithmic Finance 5 (3-4), 95-110, 2016 | 29 | 2016 |
Satellite anomalies: Benefits of a centralized anomaly database and methods for securely sharing information among satellite operators DA Galvan, W Welser IV, B Hemenway, D Baiocchi Rand Corporation, 2014 | 27 | 2014 |
Non-committing encryption from Φ-hiding B Hemenway, R Ostrovsky, A Rosen Theory of Cryptography Conference, 591-608, 2015 | 26 | 2015 |