Gordon, S. Dov
318  results:
Search for persons X
?
1

Linear Communication in Malicious Majority MPC:

, In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security,
Gordon, S. Dov ; Le, Phi Hung ; McVicker, Daniel - p. 2173-2187 , 2023
 
?
2

gOTzilla: Efficient Disjunctive Zero-Knowledge Proofs from ..:

Baldimtsi, Foteini ; Chatzigiannis, Panagiotis ; Gordon, S. Dov..
Proceedings on Privacy Enhancing Technologies.  2022 (2022)  4 - p. 229-249 , 2022
 
?
3

Fully Secure PSI via MPC-in-the-Head:

Gordon, S. Dov ; Hazay, Carmit ; Le, Phi Hung
Proceedings on Privacy Enhancing Technologies.  2022 (2022)  3 - p. 291-313 , 2022
 
?
4

Secure Sampling with Sublinear Communication:

, In: Theory of Cryptography; Lecture Notes in Computer Science,
 
?
5

(∈, δ)-Indistinguishable Mixing for Cryptocurrencies:

Liang, Mingyu ; Karantaidou, Ioanna ; Baldimtsi, Foteini..
Proceedings on Privacy Enhancing Technologies.  2022 (2021)  1 - p. 49-74 , 2021
 
?
6

Compressed Oblivious Encoding for Homomorphically Encrypted..:

, In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security,
 
?
7

The More the Merrier: Reducing the Cost of Large Scale MPC:

, In: Lecture Notes in Computer Science; Advances in Cryptology – EUROCRYPT 2021,
 
?
8

Two-party Private Set Intersection with an Untrusted Third ..:

, In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security,
Le, Phi Hung ; Ranellucci, Samuel ; Gordon, S. Dov - p. 2403-2420 , 2019
 
?
9

Stormy : Statistics in Tor by Measuring Securely:

, In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security,
Wails, Ryan ; Johnson, Aaron ; Starin, Daniel.. - p. 615-632 , 2019
 
?
10

Secure Computation with Differentially Private Access Patte..:

, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
Mazloom, Sahar ; Gordon, S. Dov - p. 490-507 , 2018
 
?
11

Simple and Efficient Two-Server ORAM:

, In: Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2018,
Gordon, S. Dov ; Katz, Jonathan ; Wang, Xiao - p. 141-157 , 2018
 
?
12

Leakage Resilience from Program Obfuscation:

Dachman-Soled, Dana ; Gordon, S. Dov ; Liu, Feng-Hao..
Journal of Cryptology.  32 (2018)  3 - p. 742-824 , 2018
 
?
13

Secure Computation with Low Communication from Cross-Checki..:

, In: Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2018,
 
?
15

Secure two-party computation in sublinear (amortized) time:

, In: Proceedings of the 2012 ACM conference on Computer and communications security,
 
1-15