Public-key cryptography in the fine-grained setting R LaVigne, A Lincoln, V Vassilevska Williams Annual International Cryptology Conference, 605-635, 2019 | 31 | 2019 |
Topology-hiding computation on all graphs A Akavia, R LaVigne, T Moran Journal of Cryptology 33 (1), 176-227, 2020 | 25 | 2020 |
Adversarially Robust Property Preserving Hash Functions E Boyle, R LaVigne, V Vaikuntanathan Cryptology ePrint Archive, 2018 | 17 | 2018 |
Topology-Hiding Computation Beyond Semi-Honest Adversaries CD Liu Zhang, M Mularczyk, U Maurer, D Tschudi, R LaVigne, T Moran TCC-Theory of Cryptography Conference, 2018 | 14* | 2018 |
Identity-based encryption with eth residuosity and its incompressibility D Boneh, R LaVigne, M Sabin Autumn 2013 TRUST Conference. Washington DC (Oct 9-10, 2013), poster …, 2013 | 13 | 2013 |
Topology-hiding computation for networks with unknown delays R LaVigne, CD Liu-Zhang, U Maurer, T Moran, M Mularczyk, D Tschudi IACR International Conference on Public-Key Cryptography, 215-245, 2020 | 6 | 2020 |
Simple Homomorphisms of Cocks IBE and Applications. R LaVigne IACR Cryptology ePrint Archive 2016, 1150, 2016 | 5 | 2016 |
Tortoise and Hares Consensus: The Meshcash Framework for Incentive-compatible, Scalable Cryptocurrencies M Ball, E Boyle, R Cohen, L Kohl, T Malkin, P Meyer, T Moran, T Moran, ... CSCML 2021 11240, 3-35, 2021 | | 2021 |
Relationships between functionality, security, and privacy for multiparty computation, hashing, and encryption RKR LaVigne Massachusetts Institute of Technology, 2020 | | 2020 |
Adversarially robust property-preserving hash functions RKR LaVigne, V Vaikuntanathan Leibniz Center for Informatics, 2019 | | 2019 |
1 Last Time-JL Lemma AM Scribe, R LaVigne, M Staib, D Tsipras | | |