Oblivious {Multi-Party} machine learning on trusted processors O Ohrimenko, F Schuster, C Fournet, A Mehta, S Nowozin, K Vaswani, ... 25th USENIX Security Symposium (USENIX Security 16), 619-636, 2016 | 673 | 2016 |
Forward and backward private searchable encryption from constrained cryptographic primitives R Bost, B Minaud, O Ohrimenko Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 456 | 2017 |
Strong and efficient cache {Side-Channel} protection using hardware transactional memory D Gruss, J Lettner, F Schuster, O Ohrimenko, I Haller, M Costa 26th USENIX Security Symposium (USENIX Security 17), 217-233, 2017 | 330 | 2017 |
Propagation via lazy clause generation O Ohrimenko, PJ Stuckey, M Codish Constraints 14, 357-391, 2009 | 314 | 2009 |
Privacy-preserving group data access via stateless oblivious RAM simulation MT Goodrich, M Mitzenmacher, O Ohrimenko, R Tamassia Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete …, 2012 | 281 | 2012 |
Oblivious RAM simulation with efficient worst-case access overhead MT Goodrich, M Mitzenmacher, O Ohrimenko, R Tamassia Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 95-100, 2011 | 176 | 2011 |
Structured encryption and leakage suppression S Kamara, T Moataz, O Ohrimenko Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 135 | 2018 |
Analyzing information leakage of updates to natural language models S Zanella-Béguelin, L Wutschitz, S Tople, V Rühle, A Paverd, ... Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 126 | 2020 |
Observing and preventing leakage in MapReduce O Ohrimenko, M Costa, C Fournet, C Gkantsidis, M Kohlweiss, D Sharma Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 109 | 2015 |
Practical oblivious storage MT Goodrich, M Mitzenmacher, O Ohrimenko, R Tamassia Proceedings of the second ACM conference on Data and Application Security …, 2012 | 108 | 2012 |
Propagation= lazy clause generation O Ohrimenko, PJ Stuckey, M Codish Principles and Practice of Constraint Programming–CP 2007: 13th …, 2007 | 105 | 2007 |
Contamination attacks and mitigation in multi-party machine learning J Hayes, O Ohrimenko Advances in neural information processing systems 31, 2018 | 101 | 2018 |
Leakage of dataset properties in {Multi-Party} machine learning W Zhang, S Tople, O Ohrimenko 30th USENIX security symposium (USENIX Security 21), 2687-2704, 2021 | 96* | 2021 |
Hash first, argue later: Adaptive verifiable computations on outsourced data D Fiore, C Fournet, E Ghosh, M Kohlweiss, O Ohrimenko, B Parno Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 95 | 2016 |
The Melbourne shuffle: Improving oblivious storage in the cloud O Ohrimenko, MT Goodrich, R Tamassia, E Upfal Automata, Languages, and Programming: 41st International Colloquium, ICALP …, 2014 | 88 | 2014 |
CCF: A framework for building confidential verifiable replicated services M Russinovich, E Ashton, C Avanessians, M Castro, A Chamayou, ... Microsoft, Redmond, WA, USA, Tech. Rep. MSR-TR-2019-16, 2019 | 84 | 2019 |
Sorting and searching behind the curtain F Baldimtsi, O Ohrimenko Financial Cryptography and Data Security: 19th International Conference, FC …, 2015 | 83 | 2015 |
Privacy-preserving machine learning MSDS Costa, CAMC Fournet, A Mehta, S Nowozin, O Ohrimenko, ... US Patent App. 15/245,141, 2017 | 55 | 2017 |
Haze: Privacy-preserving real-time traffic statistics JWS Brown, O Ohrimenko, R Tamassia Proceedings of the 21st ACM SIGSPATIAL international conference on advances …, 2013 | 48 | 2013 |
Advancing differential privacy: Where we are now and future directions for real-world deployment R Cummings, D Desfontaines, D Evans, R Geambasu, Y Huang, ... arXiv preprint arXiv:2304.06929, 2023 | 47* | 2023 |