Kevin Lewi
Kevin Lewi
Facebook
Verified email at cs.stanford.edu - Homepage
Title
Cited by
Cited by
Year
Key homomorphic PRFs and their applications
D Boneh, K Lewi, H Montgomery, A Raghunathan
Annual Cryptology Conference, 410-428, 2013
1772013
Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation
D Boneh, K Lewi, M Raykova, A Sahai, M Zhandry, J Zimmerman
Annual International Conference on the Theory and Applications of …, 2015
1722015
Order-revealing encryption: New constructions, applications, and lower bounds
K Lewi, DJ Wu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1072016
Practical order-revealing encryption with limited leakage
N Chenette, K Lewi, SA Weis, DJ Wu
International Conference on Fast Software Encryption, 474-493, 2016
1032016
Preventing Unraveling in Social Networks: The Anchored -Core Problem
K Bhawalkar, J Kleinberg, K Lewi, T Roughgarden, A Sharma
SIAM Journal on Discrete Mathematics 29 (3), 1452-1475, 2015
732015
Function-hiding inner product encryption is practical
S Kim, K Lewi, A Mandal, H Montgomery, A Roy, DJ Wu
International Conference on Security and Cryptography for Networks, 544-562, 2018
512018
Constraining pseudorandom functions privately
D Boneh, K Lewi, DJ Wu
IACR International Workshop on Public Key Cryptography, 494-524, 2017
452017
Exact weight subgraphs and the k-sum conjecture
A Abboud, K Lewi
International Colloquium on Automata, Languages, and Programming, 1-12, 2013
352013
Losing weight by gaining edges
A Abboud, K Lewi, R Williams
European Symposium on Algorithms, 1-12, 2014
342014
The online metric matching problem for doubling metrics
A Gupta, K Lewi
International Colloquium on Automata, Languages, and Programming, 424-435, 2012
312012
5gen: A framework for prototyping applications using multilinear maps and matrix branching programs
K Lewi, AJ Malozemoff, D Apon, B Carmer, A Foltzer, D Wagner, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
242016
Improved constructions of PRFs secure against related-key attacks
K Lewi, H Montgomery, A Raghunathan
International Conference on Applied Cryptography and Network Security, 44-61, 2014
222014
Iterating Inverse Binary Transducers.
K Sutner, K Lewi
Journal of Automata, Languages and Combinatorics 17 (2-4), 293-313, 2012
9*2012
Securing Update Propagation with Homomorphic Hashing.
K Lewi, W Kim, I Maykov, S Weis
IACR Cryptology ePrint Archive 2019, 227, 2019
22019
Scaling Backend Authentication at Facebook.
K Lewi, C Rain, SA Weis, Y Lee, H Xiong, B Yang
IACR Cryptology ePrint Archive 2018, 413, 2018
2018
Advanced Applications of Multilinear Maps in Cryptography
K Lewi
Stanford University, 2016
2016
The system can't perform the operation now. Try again later.
Articles 1–16