What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Payman Mohassel
Google Scholar
48
publications in security and cryptology related venues
Year
Venue
Title
2021
conf/crypto
Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions.
François Garillot
Yashvanth Kondi
Payman Mohassel
Valeria Nikolaenko
2021
conf/pkc
Private Set Operations from Oblivious Switching.
Gayathri Garimella
Payman Mohassel
Mike Rosulek
Saeed Sadeghian
Jaspal Singh
2021
conf/pkc
BETA: Biometric-Enabled Threshold Authentication.
Shashank Agrawal
Saikrishna Badrinarayanan
Payman Mohassel
Pratyay Mukherjee
Sikhar Patranabis
2020
journals/popets
Privacy-Preserving Payment Splitting.
Saba Eskandarian
Mihai Christodorescu
Payman Mohassel
2020
journals/popets
Practical Privacy-Preserving K-means Clustering.
Payman Mohassel
Mike Rosulek
Ni Trieu
2020
conf/ccs
Fast Database Joins and PSI for Secret Shared Data.
Payman Mohassel
Peter Rindal
Mike Rosulek
2018
conf/ccs
PASTA: PASsword-based Threshold Authentication.
Shashank Agrawal
Peihan Miao
Payman Mohassel
Pratyay Mukherjee
2018
conf/ccs
DiSE: Distributed Symmetric-key Encryption.
Shashank Agrawal
Payman Mohassel
Pratyay Mukherjee
Peter Rindal
2018
conf/ccs
ABY<sup>3</sup>: A Mixed Protocol Framework for Machine Learning.
Payman Mohassel
Peter Rindal
2018
conf/crypto
Non-Interactive Zero-Knowledge Proofs for Composite Statements.
Shashank Agrawal
Chaya Ganesh
Payman Mohassel
2017
conf/ccs
Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case.
Nishanth Chandran
Juan A. Garay
Payman Mohassel
Satyanarayana Vusirikala
2017
conf/sp
SecureML: A System for Scalable Privacy-Preserving Machine Learning.
Payman Mohassel
Yupeng Zhang
2017
conf/ndss
IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality.
Ian Miers
Payman Mohassel
2017
conf/eurocrypt
Non-interactive Secure 2PC in the Offline/Online and Batch Settings.
Payman Mohassel
Mike Rosulek
2017
conf/eurocrypt
Sublinear Zero-Knowledge Arguments for RAM Programs.
Payman Mohassel
Mike Rosulek
Alessandra Scafuro
2016
journals/popets
Efficient Server-Aided 2PC for Mobile Phones.
Payman Mohassel
Ostap Orobets
Ben Riva
2016
conf/crypto
TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption.
Sanjam Garg
Payman Mohassel
Charalampos Papamanthou
2016
conf/crypto
Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials.
Melissa Chase
Chaya Ganesh
Payman Mohassel
2016
conf/fc
Fast Optimistically Fair Cut-and-Choose 2PC.
Alptekin Küpçü
Payman Mohassel
2015
conf/ccs
Fast and Secure Three-party Computation: The Garbled Circuit Approach.
Payman Mohassel
Mike Rosulek
Ye Zhang
2015
conf/crypto
Efficient Zero-Knowledge Proofs of Non-algebraic Statements with Sublinear Amortized Cost.
Zhangxiang Hu
Payman Mohassel
Mike Rosulek
2015
conf/eurocrypt
How to Efficiently Evaluate RAM Programs with Malicious Security.
Arash Afshar
Zhangxiang Hu
Payman Mohassel
Mike Rosulek
2015
conf/tcc
Richer Efficiency/Security Trade-offs in 2PC.
Vladimir Kolesnikov
Payman Mohassel
Ben Riva
Mike Rosulek
2014
conf/crypto
FleXOR: Flexible Garbling for XOR Gates That Beats Free-XOR.
Vladimir Kolesnikov
Payman Mohassel
Mike Rosulek
2014
conf/fc
Scaling Private Set Intersection to Billion-Element Sets.
Seny Kamara
Payman Mohassel
Mariana Raykova
Seyed Saeed Sadeghian
2014
conf/pkc
Enhanced Chosen-Ciphertext Security and Applications.
Dana Dachman-Soled
Georg Fuchsbauer
Payman Mohassel
Adam O'Neill
2014
conf/eurocrypt
Non-Interactive Secure Computation Based on Cut-and-Choose.
Arash Afshar
Payman Mohassel
Benny Pinkas
Ben Riva
2014
conf/asiacrypt
Actively Secure Private Function Evaluation.
Payman Mohassel
Seyed Saeed Sadeghian
Nigel P. Smart
2013
conf/crypto
Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation.
Payman Mohassel
Ben Riva
2013
conf/pkc
Rate-Limited Secure Function Evaluation: Definitions and Constructions.
Özgür Dagdelen
Payman Mohassel
Daniele Venturi
2013
conf/eurocrypt
How to Hide Circuits in MPC an Efficient Framework for Private Function Evaluation.
Payman Mohassel
Seyed Saeed Sadeghian
2013
conf/africacrypt
Efficient Multiparty Computation for Arithmetic Circuits against a Covert Majority.
Isheeta Nargis
Payman Mohassel
Wayne Eberly
2012
conf/ccs
Salus: a system for server-aided secure function evaluation.
Seny Kamara
Payman Mohassel
Ben Riva
2012
conf/fc
Oblivious Decision Programs from Oblivious Transfer: Efficient Reductions.
Payman Mohassel
Salman Niksefat
2012
conf/ctrsa
An Efficient Protocol for Oblivious DFA Evaluation and Applications.
Payman Mohassel
Salman Niksefat
Seyed Saeed Sadeghian
Babak Sadeghiyan
2011
conf/cans
Fast Computation on Encrypted Polynomials and Applications.
Payman Mohassel
2010
conf/acns
Efficient and Secure Evaluation of Multivariate Polynomials and Applications.
Matthew K. Franklin
Payman Mohassel
2010
conf/eurocrypt
Adaptive Trapdoor Functions and Chosen-Ciphertext Security.
Eike Kiltz
Payman Mohassel
Adam O'Neill
2010
conf/asiacrypt
A Closer Look at Anonymity and Robustness in Encryption Schemes.
Payman Mohassel
2010
conf/sacrypt
One-Time Signatures and Chameleon Hash Functions.
Payman Mohassel
2009
conf/ctrsa
Communication-Efficient Private Protocols for Longest Common Subsequence.
Matthew K. Franklin
Mark A. Gondree
Payman Mohassel
2008
conf/crypto
Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries.
Payman Mohassel
Enav Weinreb
2008
conf/eurocrypt
Efficient Two Party and Multi Party Computation Against Covert Adversaries.
Vipul Goyal
Payman Mohassel
Adam D. Smith
2007
conf/ctrsa
Improved Efficiency for Private Stable Matching.
Matthew K. Franklin
Mark A. Gondree
Payman Mohassel
2007
conf/asiacrypt
Multi-party Indirect Indexing and Applications.
Matthew K. Franklin
Mark A. Gondree
Payman Mohassel
2007
conf/tcc
Secure Linear Algebra Using Linearly Recurrent Sequences.
Eike Kiltz
Payman Mohassel
Enav Weinreb
Matthew K. Franklin
2006
conf/pkc
Efficient Polynomial Operations in the Shared-Coefficients Setting.
Payman Mohassel
Matthew K. Franklin
2006
conf/pkc
Efficiency Tradeoffs for Malicious Two-Party Computation.
Payman Mohassel
Matthew K. Franklin
Coauthors
Adam D. Smith
(1)
Adam O'Neill
(2)
Alessandra Scafuro
(1)
Alptekin Küpçü
(1)
Arash Afshar
(2)
Babak Sadeghiyan
(1)
Ben Riva
(5)
Benny Pinkas
(1)
Charalampos Papamanthou
(1)
Chaya Ganesh
(2)
Dana Dachman-Soled
(1)
Daniele Venturi
(1)
Eike Kiltz
(2)
Enav Weinreb
(2)
François Garillot
(1)
Gayathri Garimella
(1)
Georg Fuchsbauer
(1)
Ian Miers
(1)
Isheeta Nargis
(1)
Jaspal Singh
(1)
Juan A. Garay
(1)
Mariana Raykova
(1)
Mark A. Gondree
(3)
Matthew K. Franklin
(7)
Melissa Chase
(1)
Mihai Christodorescu
(1)
Mike Rosulek
(10)
Ni Trieu
(1)
Nigel P. Smart
(1)
Nishanth Chandran
(1)
Ostap Orobets
(1)
Özgür Dagdelen
(1)
Payman Mohassel
(48)
Peihan Miao
(1)
Peter Rindal
(3)
Pratyay Mukherjee
(3)
Saba Eskandarian
(1)
Saeed Sadeghian
(1)
Saikrishna Badrinarayanan
(1)
Salman Niksefat
(2)
Sanjam Garg
(1)
Satyanarayana Vusirikala
(1)
Seny Kamara
(2)
Seyed Saeed Sadeghian
(4)
Shashank Agrawal
(4)
Sikhar Patranabis
(1)
Valeria Nikolaenko
(1)
Vipul Goyal
(1)
Vladimir Kolesnikov
(2)
Wayne Eberly
(1)
Yashvanth Kondi
(1)
Ye Zhang
(1)
Yupeng Zhang
(1)
Zhangxiang Hu
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to