Key homomorphic PRFs and their applications D Boneh, K Lewi, H Montgomery, A Raghunathan Annual Cryptology Conference, 410-428, 2013 | 392 | 2013 |
Function-hiding inner product encryption is practical S Kim, K Lewi, A Mandal, H Montgomery, A Roy, DJ Wu International Conference on Security and Cryptography for Networks, 544-562, 2018 | 185 | 2018 |
Cryptographic group actions and applications N Alamati, L De Feo, H Montgomery, S Patranabis Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 117 | 2020 |
Algebraic pseudorandom functions with improved efficiency from the augmented cascade D Boneh, HW Montgomery, A Raghunathan Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 73 | 2010 |
Private puncturable PRFs from standard lattice assumptions D Boneh, S Kim, H Montgomery Annual International Conference on the Theory and Applications of …, 2017 | 63 | 2017 |
Hyperledger cactus whitepaper H Montgomery, H Borne-Pons, J Hamilton, M Bowman, P Somogyvari, ... Retrieved on 24, 2020 | 30 | 2020 |
Relational encryption for password verification R Kamakari, T Shimoyama, H Tsuda, Y Yaginuma, A Mandal, A Roy, ... US Patent 10,129,028, 2018 | 30 | 2018 |
Improved constructions of PRFs secure against related-key attacks K Lewi, H Montgomery, A Raghunathan Applied Cryptography and Network Security: 12th International Conference …, 2014 | 30 | 2014 |
On elapsed time consensus protocols M Bowman, D Das, A Mandal, H Montgomery Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021 | 27 | 2021 |
Symmetric primitives with structured secrets N Alamati, H Montgomery, S Patranabis Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 27 | 2019 |
Robust fingerprinting codes: a near optimal construction D Boneh, A Kiayias, HW Montgomery Proceedings of the tenth annual ACM workshop on Digital rights management, 3-12, 2010 | 27 | 2010 |
Relational encryption R Kamakari, T Shimoyama, H Tsuda, Y Yaginuma, A Mandal, A Roy, ... US Patent 9,660,991, 2017 | 24 | 2017 |
Data oblivious genome variants search on Intel SGX A Mandal, JC Mitchell, H Montgomery, A Roy International Workshop on Data Privacy Management, 296-310, 2018 | 21 | 2018 |
Full quantum equivalence of group action DLog and CDH, and more H Montgomery, M Zhandry International Conference on the Theory and Application of Cryptology and …, 2022 | 20 | 2022 |
Minicrypt primitives with algebraic structure and applications N Alamati, H Montgomery, S Patranabis, A Roy Journal of Cryptology 36 (1), 2, 2023 | 17 | 2023 |
Another round of breaking and making quantum money: How to not build it from lattices, and more J Liu, H Montgomery, M Zhandry Annual International Conference on the Theory and Applications of …, 2023 | 16 | 2023 |
Relational encryption A Mandal, A Roy, H Montgomery US Patent 9,674,189, 2017 | 14 | 2017 |
Delayed-access encryption for blockchain field A Mandal, A Roy, H Montgomery US Patent 11,165,756, 2021 | 13 | 2021 |
Time-release cryptography from minimal circuit assumptions S Jaques, H Montgomery, R Rosie, A Roy Progress in Cryptology–INDOCRYPT 2021: 22nd International Conference on …, 2021 | 13 | 2021 |
Cryptocurrency-based event participation verification A Mandal, A Roy, H Montgomery US Patent 11,270,303, 2022 | 11 | 2022 |