What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Marshall Ball
Google Scholar
ORCID:
0000-0002-4236-3710
20
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurocrypt
(Inefficient Prover) ZAPs from Hard-to-Invert Functions.
Marshall Ball
Dana Dachman-Soled
2025
conf/crypto
Uniform Black-Box Separations via Non-malleable Extractors.
Marshall Ball
Dana Dachman-Soled
2024
conf/crypto
Towards Permissionless Consensus in the Standard Model via Fine-Grained Complexity.
Marshall Ball
Juan A. Garay
Peter Hall
Aggelos Kiayias
Giorgos Panagiotakos
2024
conf/eurocrypt
Non-malleable Codes with Optimal Rate for Poly-Size Circuits.
Marshall Ball
Ronen Shaltiel
Jad Silbak
2023
journals/joc
Topology-Hiding Communication from Minimal Assumptions.
Marshall Ball
Elette Boyle
Ran Cohen
Lisa Kohl
Tal Malkin
Pierre Meyer
Tal Moran
2023
conf/eurocrypt
New Ways to Garble Arithmetic Circuits.
Marshall Ball
Hanjun Li
Huijia Lin
Tianren Liu
2023
conf/tcc
Immunizing Backdoored PRGs.
Marshall Ball
Yevgeniy Dodis
Eli Goldin
2023
conf/tcc
Towards Topology-Hiding Computation from Oblivious Transfer.
Marshall Ball
Alexander Bienstock
Lisa Kohl
Pierre Meyer
2022
conf/crypto
(Nondeterministic) Hardness vs. Non-malleability.
Marshall Ball
Dana Dachman-Soled
Julian Loss
2020
conf/crypto
Non-malleability Against Polynomial Tampering.
Marshall Ball
Eshan Chattopadhyay
Jyun-Jie Liao
Tal Malkin
Li-Yang Tan
2020
conf/crypto
New Techniques for Zero-Knowledge: Leveraging Inefficient Provers to Reduce Assumptions, Interaction, and Trust.
Marshall Ball
Dana Dachman-Soled
Mukul Kulkarni
2020
conf/tcc
Topology-Hiding Communication from Minimal Assumptions.
Marshall Ball
Elette Boyle
Ran Cohen
Lisa Kohl
Tal Malkin
Pierre Meyer
Tal Moran
2019
conf/crypto
Non-malleable Codes for Decision Trees.
Marshall Ball
Siyao Guo
Daniel Wichs
2019
conf/eurocrypt
Non-Malleable Codes Against Bounded Polynomial Time Tampering.
Marshall Ball
Dana Dachman-Soled
Mukul Kulkarni
Huijia Lin
Tal Malkin
2019
conf/tcc
Is Information-Theoretic Topology-Hiding Computation Possible?
Marshall Ball
Elette Boyle
Ran Cohen
Tal Malkin
Tal Moran
2018
conf/crypto
Proofs of Work From Worst-Case Assumptions.
Marshall Ball
Alon Rosen
Manuel Sabin
Prashant Nalini Vasudevan
2018
conf/eurocrypt
Non-malleable Codes from Average-Case Hardness: $${\mathsf {A}}{\mathsf {C}}^0$$ , Decision Trees, and Streaming Space-Bounded Tampering.
Marshall Ball
Dana Dachman-Soled
Mukul Kulkarni
Tal Malkin
2018
conf/eurocrypt
Exploring the Boundaries of Topology-Hiding Computation.
Marshall Ball
Elette Boyle
Tal Malkin
Tal Moran
2016
conf/ccs
Garbling Gadgets for Boolean and Arithmetic Circuits.
Marshall Ball
Tal Malkin
Mike Rosulek
2016
conf/eurocrypt
Non-malleable Codes for Bounded Depth, Bounded Fan-In Circuits.
Marshall Ball
Dana Dachman-Soled
Mukul Kulkarni
Tal Malkin
Coauthors
Aggelos Kiayias
(1)
Alexander Bienstock
(1)
Alon Rosen
(1)
Dana Dachman-Soled
(7)
Daniel Wichs
(1)
Elette Boyle
(4)
Eli Goldin
(1)
Eshan Chattopadhyay
(1)
Giorgos Panagiotakos
(1)
Hanjun Li
(1)
Huijia Lin
(2)
Jad Silbak
(1)
Juan A. Garay
(1)
Julian Loss
(1)
Jyun-Jie Liao
(1)
Li-Yang Tan
(1)
Lisa Kohl
(3)
Manuel Sabin
(1)
Marshall Ball
(20)
Mike Rosulek
(1)
Mukul Kulkarni
(4)
Peter Hall
(1)
Pierre Meyer
(3)
Prashant Nalini Vasudevan
(1)
Ran Cohen
(3)
Ronen Shaltiel
(1)
Siyao Guo
(1)
Tal Malkin
(9)
Tal Moran
(4)
Tianren Liu
(1)
Yevgeniy Dodis
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to