year | title | booktitle | pages | |
---|---|---|---|---|
1 | 2016 | TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption | crypto | 563-592 |
2 | 2015 | Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts | eprint | 675 |
3 | 2015 | Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness | asiacrypt | 337-359 |
4 | 2015 | Oblivious Network RAM | eprint | 73 |
5 | 2015 | TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption | eprint | 1010 |
6 | 2014 | TRUESET: Nearly Practical Verifiable Set Computations | eprint | 160 |
7 | 2013 | Streaming Authenticated Data Structures | eurocrypt | 353-370 |
8 | 2013 | Signatures of Correct Computation | TCC | 221 |
9 | 2011 | Optimal Verification of Operations on Dynamic Sets | crypto | 91 |
10 | 2010 | Optimal Authentication of Operations on Dynamic Sets | eprint | online |
11 | 2010 | Update-Optimal Authenticated Structures Based on Lattices | eprint | online |
12 | 2008 | Dynamic Provable Data Possession | eprint | online |