Privacy-preserving distributed linear regression on high-dimensional data A Gascón, P Schoppmann, B Balle, M Raykova, J Doerner, S Zahur, ... Cryptology ePrint Archive, 2016 | 253 | 2016 |
Scaling ORAM for secure computation J Doerner, A Shelat Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 189 | 2017 |
Secure two-party threshold ECDSA from ECDSA assumptions J Doerner, Y Kondi, E Lee, A Shelat 2018 IEEE Symposium on Security and Privacy (SP), 980-997, 2018 | 173 | 2018 |
Threshold ECDSA from ECDSA assumptions: The multiparty case J Doerner, Y Kondi, E Lee, A Shelat 2019 IEEE Symposium on Security and Privacy (SP), 1051-1066, 2019 | 147 | 2019 |
Revisiting square-root ORAM: efficient random access in multi-party computation S Zahur, X Wang, M Raykova, A Gascón, J Doerner, D Evans, J Katz 2016 IEEE Symposium on Security and Privacy (SP), 218-234, 2016 | 142* | 2016 |
Secure linear regression on vertically partitioned datasets. A Gascón, P Schoppmann, B Balle, M Raykova, J Doerner, S Zahur, ... IACR Cryptol. ePrint Arch. 2016, 892, 2016 | 117 | 2016 |
Secure Stable Matching at Scale J Doerner, D Evans, A Shelat | 65 | 2016 |
Multiparty generation of an RSA modulus M Chen, J Doerner, Y Kondi, E Lee, S Rosefield, A Shelat, R Cohen Journal of Cryptology 35 (2), 12, 2022 | 37 | 2022 |
Threshold bbs+ signatures for distributed anonymous credential issuance J Doerner, Y Kondi, E Lee, A Shelat, LK Tyner 2023 IEEE Symposium on Security and Privacy (SP), 773-789, 2023 | 14 | 2023 |
Threshold ECDSA in Three Rounds J Doerner, Y Kondi, E Lee Cryptology ePrint Archive, 2023 | 7 | 2023 |
Guaranteed Output in Rounds for Round-Robin Sampling Protocols R Cohen, J Doerner, Y Kondi, A Shelat Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International …, 2022 | 4* | 2022 |
Constant-Round Simulation-Secure Coin Tossing Extension with Guaranteed Output D Abram, J Doerner, Y Ishai, V Narayanan Annual International Conference on the Theory and Applications of …, 2024 | | 2024 |
Sometimes You Can’t Distribute Random-Oracle-Based Proofs J Doerner, Y Kondi, LN Rosenbloom Cryptology ePrint Archive, 2023 | | 2023 |
Secure Multiparty Computation with Identifiable Abort from Vindicating Release R Cohen, J Doerner, Y Kondi Cryptology ePrint Archive, 2023 | | 2023 |
Three Useful Threshold Cryptography Problems With Efficient Solutions J Doerner Northeastern University, 2022 | | 2022 |
Poster: Secure Gale-Shapley J Doerner, D Evans, A Shelat | | 2016 |