Follow
Alex J. Malozemoff
Alex J. Malozemoff
Galois
Verified email at galois.com
Title
Cited by
Cited by
Year
EMP-toolkit: Efficient MultiParty computation toolkit
X Wang, AJ Malozemoff, J Katz
2662016
Amortizing garbled circuits
Y Huang, J Katz, V Kolesnikov, R Kumaresan, AJ Malozemoff
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
972014
: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions
C Baum, AJ Malozemoff, MB Rosen, P Scholl
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
832021
Faster secure two-party computation in the single-execution setting
X Wang, AJ Malozemoff, J Katz
Annual international conference on the theory and applications of …, 2017
632017
Implementing cryptographic program obfuscation
D Apon, Y Huang, J Katz, AJ Malozemoff
IACR Cryptology ePrint Archive 2014 (2014/779), 2014
612014
Ramparts: A programmer-friendly system for building homomorphic encryption applications
DW Archer, JM Calderón Trilla, J Dagit, A Malozemoff, Y Polyakov, ...
Proceedings of the 7th acm workshop on encrypted computing & applied …, 2019
482019
Efficient three-party computation from cut-and-choose
SG Choi, J Katz, AJ Malozemoff, V Zikas
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
452014
Automated analysis and synthesis of authenticated encryption schemes
VT Hoang, J Katz, AJ Malozemoff
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
402015
5Gen: A framework for prototyping applications using multilinear maps and matrix branching programs
K Lewi, AJ Malozemoff, D Apon, B Carmer, A Foltzer, D Wagner, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
362016
Automated analysis and synthesis of block-cipher modes of operation
AJ Malozemoff, J Katz, MD Green
2014 IEEE 27th Computer Security Foundations Symposium, 140-152, 2014
362014
Public verifiability in the covert model (almost) for free
V Kolesnikov, AJ Malozemoff
International Conference on the Theory and Application of Cryptology and …, 2015
292015
A standard API for RLWE-based homomorphic encryption
M Brenner, W Dai, S Halevi, K Han, A Jalali, M Kim, K Laine, ...
Technical report, HomomorphicEncryption. org, Redmond WA, 2017
262017
Efficiently enforcing input validity in secure two-party computation
J Katz, AJ Malozemoff, XS Wang
IACR Cryptology ePrint Archive 2016 (2016/184), 2016
222016
CompGC: efficient offline/online semi-honest two-party computation.
A Groce, A Ledger, AJ Malozemoff, A Yerukhimovich
IACR Cryptology ePrint Archive 2016 (2016/458), 2016
212016
Attribute-based key exchange with general policies
V Kolesnikov, H Krawczyk, Y Lindell, A Malozemoff, T Rabin
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
192016
5Gen-C: Multi-input functional encryption and program obfuscation for arithmetic circuits
B Carmer, AJ Malozemoff, M Raykova
Proceedings of the 24th ACM SIGSAC Conference on Computer and Communications …, 2017
172017
A unified approach to idealized model separations via indistinguishability obfuscation
MD Green, J Katz, AJ Malozemoff, HS Zhou
International Conference on Security and Cryptography for Networks, 587-603, 2016
152016
Balboa: Bobbing and weaving around network censorship
MB Rosen, J Parker, AJ Malozemoff
30th USENIX Security Symposium (USENIX Security 21), 3399-3413, 2021
122021
Public-key function-private hidden vector encryption (and more)
J Bartusek, B Carmer, A Jain, Z Jin, T Lepoint, F Ma, T Malkin, ...
International Conference on the Theory and Application of Cryptology and …, 2019
102019
Faster two-party computation secure against malicious adversaries in the single-execution setting
X Wang, AJ Malozemoff, J Katz
Cryptology ePrint Archive, 2016
102016
The system can't perform the operation now. Try again later.
Articles 1–20