Elette Boyle
Elette Boyle
Unknown affiliation
Verified email at mit.edu
Title
Cited by
Cited by
Year
Functional signatures and pseudorandom functions
E Boyle, S Goldwasser, I Ivan
International Workshop on Public Key Cryptography, 501-519, 2014
2942014
On extractability obfuscation
E Boyle, KM Chung, R Pass
Theory of Cryptography Conference, 52-73, 2014
1532014
Fully leakage-resilient signatures
E Boyle, G Segev, D Wichs
Journal of cryptology 26 (3), 513-558, 2013
1102013
Function secret sharing
E Boyle, N Gilboa, Y Ishai
Annual international conference on the theory and applications of …, 2015
1032015
Oblivious parallel RAM and applications
E Boyle, KM Chung, R Pass
Theory of Cryptography Conference, 175-204, 2016
692016
Breaking the circuit size barrier for secure computation under DDH
E Boyle, N Gilboa, Y Ishai
Annual International Cryptology Conference, 509-539, 2016
592016
Limits of extractability assumptions with distributional auxiliary input
E Boyle, R Pass
International Conference on the Theory and Application of Cryptology and …, 2015
522015
Communication locality in secure multi-party computation
E Boyle, S Goldwasser, S Tessaro
Theory of Cryptography Conference, 356-376, 2013
522013
Function secret sharing: Improvements and extensions
E Boyle, N Gilboa, Y Ishai
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
512016
Multiparty computation secure against continual memory leakage
E Boyle, S Goldwasser, A Jain, YT Kalai
Proceedings of the forty-fourth annual ACM symposium on Theory of computing …, 2012
442012
Large-scale secure computation: Multi-party computation for (parallel) RAM programs
E Boyle, KM Chung, R Pass
Annual Cryptology Conference, 742-762, 2015
42*2015
Group-based secure computation: optimizing rounds, communication, and computation
E Boyle, N Gilboa, Y Ishai
Annual International Conference on the Theory and Applications of …, 2017
402017
Is There an Oblivious RAM Lower Bound?
E Boyle, M Naor
Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016
352016
Secure computation against adaptive auxiliary information
E Boyle, S Garg, A Jain, YT Kalai, A Sahai
Annual Cryptology Conference, 316-334, 2013
262013
Foundations of homomorphic secret sharing
E Boyle, N Gilboa, Y Ishai, H Lin, S Tessaro
9th Innovations in Theoretical Computer Science Conference (ITCS 2018), 2018
242018
Leakage-resilient coin tossing
E Boyle, S Goldwasser, YT Kalai
Distributed computing 27 (3), 147-164, 2014
222014
Homomorphic secret sharing: optimizations and applications
E Boyle, G Couteau, N Gilboa, Y Ishai, M Orrų
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
212017
Compressing vector OLE
E Boyle, G Couteau, N Gilboa, Y Ishai
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
202018
Can we access a database both locally and privately?
E Boyle, Y Ishai, R Pass, M Wootters
Theory of Cryptography Conference, 662-693, 2017
132017
Efficient pseudorandom correlation generators: Silent OT extension and more
E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Scholl
Annual International Cryptology Conference, 489-518, 2019
102019
The system can't perform the operation now. Try again later.
Articles 1–20