What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Elette Boyle
Google Scholar
54
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Preprocessing for Life: Dishonest-Majority MPC with a Trusted or Untrusted Dealer.
Elette Boyle
Niv Gilboa
Matan Hamilis
Yuval Ishai
Ariel Nof
2025
conf/sp
Improved Constructions for Distributed Multi-Point Functions.
Elette Boyle
Niv Gilboa
Matan Hamilis
Yuval Ishai
Yaxin Tu
2025
conf/pkc
Non-Interactive Distributed Point Functions.
Elette Boyle
Lalita Devadas
Sacha Servan-Schreiber
2025
conf/eurocrypt
Simultaneous-Message and Succinct Secure Computation.
Elette Boyle
Abhishek Jain
Sacha Servan-Schreiber
Akshayaram Srinivasan
2025
conf/eurocrypt
The Complexity of Memory Checking with Covert Security.
Elette Boyle
Ilan Komargodski
Neekon Vafa
2024
journals/joc
Breaking the $O(\sqrt{n})$-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party.
Elette Boyle
Ran Cohen
Aarushi Goel
2024
conf/ccs
Secure Sorting and Selection via Function Secret Sharing.
Amit Agarwal
Elette Boyle
Nishanth Chandran
Niv Gilboa
Divya Gupta
Yuval Ishai
Mahimna Kelkar
Yiping Ma
2024
conf/crypto
Compressing Unit-Vector Correlations via Sparse Pseudorandom Generators.
Amit Agarwal
Elette Boyle
Niv Gilboa
Yuval Ishai
Mahimna Kelkar
Yiping Ma
2024
conf/asiacrypt
Direct FSS Constructions for Branching Programs and More from PRGs with Encoded-Output Homomorphism.
Elette Boyle
Lisa Kohl
Zhe Li
Peter Scholl
2023
journals/joc
Must the Communication Graph of MPC Protocols be an Expander?
Elette Boyle
Ran Cohen
Deepesh Data
Pavel Hubácek
2023
journals/joc
Topology-Hiding Communication from Minimal Assumptions.
Marshall Ball
Elette Boyle
Ran Cohen
Lisa Kohl
Tal Malkin
Pierre Meyer
Tal Moran
2023
conf/crypto
Arithmetic Sketching.
Dan Boneh
Elette Boyle
Henry Corrigan-Gibbs
Niv Gilboa
Yuval Ishai
2023
conf/eurocrypt
Sublinear-Communication Secure Multiparty Computation Does Not Require FHE.
Elette Boyle
Geoffroy Couteau
Pierre Meyer
2023
conf/eurocrypt
Oblivious Transfer with Constant Computational Overhead.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
Lisa Kohl
Nicolas Resch
Peter Scholl
2023
conf/tcc
Locally Verifiable Distributed SNARGs.
Eden Aldema Tshuva
Elette Boyle
Ran Cohen
Tal Moran
Rotem Oshman
2022
conf/crypto
Correlated Pseudorandomness from Expand-Accumulate Codes.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
Lisa Kohl
Nicolas Resch
Peter Scholl
2022
conf/crypto
Programmable Distributed Point Functions.
Elette Boyle
Niv Gilboa
Yuval Ishai
Victor I. Kolobov
2022
conf/eurocrypt
Secure Multiparty Computation with Sublinear Preprocessing.
Elette Boyle
Niv Gilboa
Yuval Ishai
Ariel Nof
2022
conf/tcc
Sublinear Secure Computation from New Assumptions.
Elette Boyle
Geoffroy Couteau
Pierre Meyer
2021
conf/crypto
Low-Complexity Weak Pseudorandom Functions in $\mathtt {AC}0[\mathtt {MOD}2]$.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
Lisa Kohl
Peter Scholl
2021
conf/crypto
Sublinear GMW-Style Compiler for MPC with Preprocessing.
Elette Boyle
Niv Gilboa
Yuval Ishai
Ariel Nof
2021
conf/sp
Lightweight Techniques for Private Heavy Hitters.
Dan Boneh
Elette Boyle
Henry Corrigan-Gibbs
Niv Gilboa
Yuval Ishai
2021
conf/eurocrypt
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.
Elette Boyle
Nishanth Chandran
Niv Gilboa
Divya Gupta
Yuval Ishai
Nishant Kumar
Mayank Rathee
2021
conf/tcc
Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation.
Fabrice Benhamouda
Elette Boyle
Niv Gilboa
Shai Halevi
Yuval Ishai
Ariel Nof
2020
conf/crypto
Efficient Pseudorandom Correlation Generators from Ring-LPN.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
Lisa Kohl
Peter Scholl
2020
conf/asiacrypt
Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs.
Elette Boyle
Niv Gilboa
Yuval Ishai
Ariel Nof
2020
conf/tcc
Topology-Hiding Communication from Minimal Assumptions.
Marshall Ball
Elette Boyle
Ran Cohen
Lisa Kohl
Tal Malkin
Pierre Meyer
Tal Moran
2019
conf/ccs
Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs.
Elette Boyle
Niv Gilboa
Yuval Ishai
Ariel Nof
2019
conf/ccs
Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
Lisa Kohl
Peter Rindal
Peter Scholl
2019
conf/crypto
Efficient Pseudorandom Correlation Generators: Silent OT Extension and More.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
Lisa Kohl
Peter Scholl
2019
conf/crypto
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs.
Dan Boneh
Elette Boyle
Henry Corrigan-Gibbs
Niv Gilboa
Yuval Ishai
2019
conf/eurocrypt
Homomorphic Secret Sharing from Lattices Without FHE.
Elette Boyle
Lisa Kohl
Peter Scholl
2019
conf/tcc
Permuted Puzzles and Cryptographic Hardness.
Elette Boyle
Justin Holmgren
Mor Weiss
2019
conf/tcc
Secure Computation with Preprocessing via Function Secret Sharing.
Elette Boyle
Niv Gilboa
Yuval Ishai
2019
conf/tcc
Is Information-Theoretic Topology-Hiding Computation Possible?
Marshall Ball
Elette Boyle
Ran Cohen
Tal Malkin
Tal Moran
2018
conf/ccs
Compressing Vector OLE.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
2018
conf/crypto
Limits of Practical Sublinear Secure Computation.
Elette Boyle
Yuval Ishai
Antigoni Polychroniadou
2018
conf/crypto
Must the Communication Graph of MPC Protocols be an Expander?
Elette Boyle
Ran Cohen
Deepesh Data
Pavel Hubácek
2018
conf/eurocrypt
Exploring the Boundaries of Topology-Hiding Computation.
Marshall Ball
Elette Boyle
Tal Malkin
Tal Moran
2017
conf/ccs
Homomorphic Secret Sharing: Optimizations and Applications.
Elette Boyle
Geoffroy Couteau
Niv Gilboa
Yuval Ishai
Michele Orrù
2017
conf/eurocrypt
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation.
Elette Boyle
Niv Gilboa
Yuval Ishai
2017
conf/tcc
Can We Access a Database Both Locally and Privately?
Elette Boyle
Yuval Ishai
Rafael Pass
Mary Wootters
2016
conf/ccs
Function Secret Sharing: Improvements and Extensions.
Elette Boyle
Niv Gilboa
Yuval Ishai
2016
conf/crypto
Breaking the Circuit Size Barrier for Secure Computation Under DDH.
Elette Boyle
Niv Gilboa
Yuval Ishai
2016
conf/tcc
Oblivious Parallel RAM and Applications.
Elette Boyle
Kai-Min Chung
Rafael Pass
2015
conf/crypto
Large-Scale Secure Computation: Multi-party Computation for (Parallel) RAM Programs.
Elette Boyle
Kai-Min Chung
Rafael Pass
2015
conf/eurocrypt
Function Secret Sharing.
Elette Boyle
Niv Gilboa
Yuval Ishai
2015
conf/asiacrypt
Limits of Extractability Assumptions with Distributional Auxiliary Input.
Elette Boyle
Rafael Pass
2014
conf/pkc
Functional Signatures and Pseudorandom Functions.
Elette Boyle
Shafi Goldwasser
Ioana Ivan
2014
conf/tcc
On Extractability Obfuscation.
Elette Boyle
Kai-Min Chung
Rafael Pass
2013
journals/joc
Fully Leakage-Resilient Signatures.
Elette Boyle
Gil Segev
Daniel Wichs
2013
conf/crypto
Secure Computation against Adaptive Auxiliary Information.
Elette Boyle
Sanjam Garg
Abhishek Jain
Yael Tauman Kalai
Amit Sahai
2013
conf/tcc
Communication Locality in Secure Multi-party Computation - How to Run Sublinear Algorithms in a Distributed Setting.
Elette Boyle
Shafi Goldwasser
Stefano Tessaro
2011
conf/eurocrypt
Fully Leakage-Resilient Signatures.
Elette Boyle
Gil Segev
Daniel Wichs
Coauthors
Aarushi Goel
(1)
Abhishek Jain
(2)
Akshayaram Srinivasan
(1)
Amit Agarwal
(2)
Amit Sahai
(1)
Antigoni Polychroniadou
(1)
Ariel Nof
(6)
Dan Boneh
(3)
Daniel Wichs
(2)
Deepesh Data
(2)
Divya Gupta
(2)
Eden Aldema Tshuva
(1)
Elette Boyle
(54)
Fabrice Benhamouda
(1)
Geoffroy Couteau
(10)
Gil Segev
(2)
Henry Corrigan-Gibbs
(3)
Ilan Komargodski
(1)
Ioana Ivan
(1)
Justin Holmgren
(1)
Kai-Min Chung
(3)
Lalita Devadas
(1)
Lisa Kohl
(10)
Mahimna Kelkar
(2)
Marshall Ball
(4)
Mary Wootters
(1)
Matan Hamilis
(2)
Mayank Rathee
(1)
Michele Orrù
(1)
Mor Weiss
(1)
Neekon Vafa
(1)
Nicolas Resch
(2)
Nishant Kumar
(1)
Nishanth Chandran
(2)
Niv Gilboa
(27)
Pavel Hubácek
(2)
Peter Rindal
(1)
Peter Scholl
(8)
Pierre Meyer
(4)
Rafael Pass
(5)
Ran Cohen
(7)
Rotem Oshman
(1)
Sacha Servan-Schreiber
(2)
Sanjam Garg
(1)
Shafi Goldwasser
(2)
Shai Halevi
(1)
Stefano Tessaro
(1)
Tal Malkin
(4)
Tal Moran
(5)
Victor I. Kolobov
(1)
Yael Tauman Kalai
(1)
Yaxin Tu
(1)
Yiping Ma
(2)
Yuval Ishai
(29)
Zhe Li
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to