What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mike Rosulek
Google Scholar
57
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/crypto
How to Tolerate Typos in Strong Asymmetric PAKE.
Ian McQuoid
Mike Rosulek
Jiayu Xu
2025
conf/crypto
Lower Bounds for Garbled Circuits from Shannon-Type Information Inequalities.
Jake Januzelli
Mike Rosulek
Lawrence Roy
2023
journals/popets
Verifiable Distributed Aggregation Functions.
Hannah Davis
Christopher Patton
Mike Rosulek
Phillipp Schoppmann
2023
conf/crypto
Malicious Secure, Structure-Aware Private Set Intersection.
Gayathri Garimella
Mike Rosulek
Jaspal Singh
2022
conf/uss
Practical Privacy-Preserving Authentication for SSH.
Lawrence Roy
Stanislav Lyakhov
Yeongjin Jang
Mike Rosulek
2022
conf/crypto
Structure-Aware Private Set Intersection, with Applications to Fuzzy Matching.
Gayathri Garimella
Mike Rosulek
Jaspal Singh
2022
conf/tcc
How to Obfuscate MPC Inputs.
Ian McQuoid
Mike Rosulek
Jiayu Xu
2021
journals/popets
On the (Im)Practicality of Adversarial Perturbation for Image Privacy.
Arezoo Rajabi
Rakesh B. Bobba
Mike Rosulek
Charles V. Wright
Wu-chi Feng
2021
conf/ccs
Compact and Malicious Private Set Intersection for Small Sets.
Mike Rosulek
Ni Trieu
2021
conf/crypto
Oblivious Key-Value Stores and Amplification for Private Set Intersection.
Gayathri Garimella
Benny Pinkas
Mike Rosulek
Ni Trieu
Avishay Yanai
2021
conf/crypto
Three Halves Make a Whole? Beating the Half-Gates Lower Bound for Garbled Circuits.
Mike Rosulek
Lawrence Roy
2021
conf/pkc
Private Set Operations from Oblivious Switching.
Gayathri Garimella
Payman Mohassel
Mike Rosulek
Saeed Sadeghian
Jaspal Singh
2021
conf/asiacrypt
Batching Base Oblivious Transfers.
Ian McQuoid
Mike Rosulek
Lawrence Roy
2020
journals/popets
Practical Privacy-Preserving K-means Clustering.
Payman Mohassel
Mike Rosulek
Ni Trieu
2020
conf/ccs
Fast Database Joins and PSI for Secret Shared Data.
Payman Mohassel
Peter Rindal
Mike Rosulek
2020
conf/ccs
Minimal Symmetric PAKE and 1-out-of-N OT from Programmable-Once Public Functions.
Ian McQuoid
Mike Rosulek
Lawrence Roy
2020
conf/eurocrypt
PSI from PaXoS: Fast, Malicious Private Set Intersection.
Benny Pinkas
Mike Rosulek
Ni Trieu
Avishay Yanai
2019
journals/popets
Cheaper Private Set Intersection via Differentially Private Leakage.
Adam Groce
Peter Rindal
Mike Rosulek
2019
conf/ccs
Secure Data Exchange: A Marketplace in the Cloud.
Ran Gilad-Bachrach
Kim Laine
Kristin E. Lauter
Peter Rindal
Mike Rosulek
2019
conf/crypto
SpOT-Light: Lightweight Private Set Intersection from Sparse OT Extension.
Benny Pinkas
Mike Rosulek
Ni Trieu
Avishay Yanai
2019
conf/ndss
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption.
Kimia Tajik
Akshith Gunasekaran
Rhea Dutta
Brandon Ellis
Rakesh B. Bobba
Mike Rosulek
Charles V. Wright
Wu-chi Feng
2019
conf/asiacrypt
Scalable Private Set Union from Symmetric-Key Techniques.
Vladimir Kolesnikov
Mike Rosulek
Ni Trieu
Xiao Wang
2019
conf/tcc
Characterizing Collision and Second-Preimage Resistance in Linicrypt.
Ian McQuoid
Trevor Swope
Mike Rosulek
2018
journals/popets
PIR-PSI: Scaling Private Contact Discovery.
Daniel Demmler
Peter Rindal
Mike Rosulek
Ni Trieu
2018
conf/ccs
TACHYON: Fast Signatures from Compact Knapsack.
Rouzbeh Behnia
Muslum Ozgur Ozmen
Attila A. Yavuz
Mike Rosulek
2018
conf/crypto
Optimizing Authenticated Garbling for Faster Secure Two-Party Computation.
Jonathan Katz
Samuel Ranellucci
Mike Rosulek
Xiao Wang
2018
conf/fc
SWiM: Secure Wildcard Pattern Matching from OT Extension.
Vladimir Kolesnikov
Mike Rosulek
Ni Trieu
2018
conf/tcc
On the Structure of Unconditional UC Hybrid Protocols.
Mike Rosulek
Morgan Shirley
2017
journals/joc
Reconciling Non-malleability with Homomorphic Encryption.
Manoj Prabhakaran
Mike Rosulek
2017
conf/ccs
Practical Multi-party Private Set Intersection from Symmetric-Key Techniques.
Vladimir Kolesnikov
Naor Matania
Benny Pinkas
Mike Rosulek
Ni Trieu
2017
conf/ccs
DUPLO: Unifying Cut-and-Choose for Garbled Circuits.
Vladimir Kolesnikov
Jesper Buus Nielsen
Mike Rosulek
Ni Trieu
Roberto Trifiletti
2017
conf/ccs
Approximate Thumbnail Preserving Encryption.
Byron Marohn
Charles V. Wright
Wu-chi Feng
Mike Rosulek
Rakesh B. Bobba
2017
conf/ccs
Malicious-Secure Private Set Intersection via Dual Execution.
Peter Rindal
Mike Rosulek
2017
conf/eurocrypt
Non-interactive Secure 2PC in the Offline/Online and Batch Settings.
Payman Mohassel
Mike Rosulek
2017
conf/eurocrypt
Sublinear Zero-Knowledge Arguments for RAM Programs.
Payman Mohassel
Mike Rosulek
Alessandra Scafuro
2017
conf/eurocrypt
Improved Private Set Intersection Against Malicious Adversaries.
Peter Rindal
Mike Rosulek
2016
conf/ccs
Efficient Batched Oblivious PRF with Applications to Private Set Intersection.
Vladimir Kolesnikov
Ranjit Kumaresan
Mike Rosulek
Ni Trieu
2016
conf/ccs
Garbling Gadgets for Boolean and Arithmetic Circuits.
Marshall Ball
Tal Malkin
Mike Rosulek
2016
conf/uss
Faster Malicious 2-Party Secure Computation with Online/Offline Dual Execution.
Peter Rindal
Mike Rosulek
2016
conf/crypto
Linicrypt: A Model for Practical Cryptography.
Brent Carmer
Mike Rosulek
2015
conf/ccs
Fast and Secure Three-party Computation: The Garbled Circuit Approach.
Payman Mohassel
Mike Rosulek
Ye Zhang
2015
conf/crypto
Efficient Zero-Knowledge Proofs of Non-algebraic Statements with Sublinear Amortized Cost.
Zhangxiang Hu
Payman Mohassel
Mike Rosulek
2015
conf/eurocrypt
Two Halves Make a Whole - Reducing Data Transfer in Garbled Circuits Using Half Gates.
Samee Zahur
Mike Rosulek
David Evans
2015
conf/eurocrypt
How to Efficiently Evaluate RAM Programs with Malicious Security.
Arash Afshar
Zhangxiang Hu
Payman Mohassel
Mike Rosulek
2015
conf/tcc
Richer Efficiency/Security Trade-offs in 2PC.
Vladimir Kolesnikov
Payman Mohassel
Ben Riva
Mike Rosulek
2014
conf/crypto
FleXOR: Flexible Garbling for XOR Gates That Beats Free-XOR.
Vladimir Kolesnikov
Payman Mohassel
Mike Rosulek
2013
conf/eurocrypt
Multi-party Computation of Polynomials and Branching Programs without Simultaneous Interaction.
S. Dov Gordon
Tal Malkin
Mike Rosulek
Hoeteck Wee
2013
conf/tcc
Characterizing the Cryptographic Properties of Reactive 2-Party Functionalities.
R. Amzi Jeffs
Mike Rosulek
2012
conf/crypto
Must You Know the Code of f to Securely Compute f?
Mike Rosulek
2012
conf/crypto
Universal Composability from Essentially Any Trusted Setup.
Mike Rosulek
2011
conf/ctrsa
Attribute-Based Signatures.
Hemanta K. Maji
Manoj Prabhakaran
Mike Rosulek
2011
conf/tcc
Exploring the Limits of Common Coins Using Frontier Analysis of Protocols.
Hemanta K. Maji
Pichayoot Ouppaphan
Manoj Prabhakaran
Mike Rosulek
2010
conf/crypto
A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security.
Hemanta K. Maji
Manoj Prabhakaran
Mike Rosulek
2009
conf/tcc
Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation.
Hemanta K. Maji
Manoj Prabhakaran
Mike Rosulek
2008
conf/crypto
Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations.
Manoj Prabhakaran
Mike Rosulek
2008
conf/asiacrypt
Towards Robust Computation on Encrypted Data.
Manoj Prabhakaran
Mike Rosulek
2007
conf/crypto
Rerandomizable RCCA Encryption.
Manoj Prabhakaran
Mike Rosulek
Coauthors
Adam Groce
(1)
Akshith Gunasekaran
(1)
Alessandra Scafuro
(1)
Arash Afshar
(1)
Arezoo Rajabi
(1)
Attila A. Yavuz
(1)
Avishay Yanai
(3)
Ben Riva
(1)
Benny Pinkas
(4)
Brandon Ellis
(1)
Brent Carmer
(1)
Byron Marohn
(1)
Charles V. Wright
(3)
Christopher Patton
(1)
Daniel Demmler
(1)
David Evans
(1)
Gayathri Garimella
(4)
Hannah Davis
(1)
Hemanta K. Maji
(4)
Hoeteck Wee
(1)
Ian McQuoid
(5)
Jake Januzelli
(1)
Jaspal Singh
(3)
Jesper Buus Nielsen
(1)
Jiayu Xu
(2)
Jonathan Katz
(1)
Kim Laine
(1)
Kimia Tajik
(1)
Kristin E. Lauter
(1)
Lawrence Roy
(5)
Manoj Prabhakaran
(8)
Marshall Ball
(1)
Mike Rosulek
(57)
Morgan Shirley
(1)
Muslum Ozgur Ozmen
(1)
Naor Matania
(1)
Ni Trieu
(11)
Payman Mohassel
(10)
Peter Rindal
(7)
Phillipp Schoppmann
(1)
Pichayoot Ouppaphan
(1)
R. Amzi Jeffs
(1)
Rakesh B. Bobba
(3)
Ran Gilad-Bachrach
(1)
Ranjit Kumaresan
(1)
Rhea Dutta
(1)
Roberto Trifiletti
(1)
Rouzbeh Behnia
(1)
S. Dov Gordon
(1)
Saeed Sadeghian
(1)
Samee Zahur
(1)
Samuel Ranellucci
(1)
Stanislav Lyakhov
(1)
Tal Malkin
(2)
Trevor Swope
(1)
Vladimir Kolesnikov
(7)
Wu-chi Feng
(3)
Xiao Wang
(2)
Ye Zhang
(1)
Yeongjin Jang
(1)
Zhangxiang Hu
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to