Alex Davidson
Cited by
Cited by
Estimate all the {LWE, NTRU} schemes!
MR Albrecht, BR Curtis, A Deo, A Davidson, R Player, EW Postlethwaite, ...
Security and Cryptography for Networks: 11th International Conference, SCN …, 2018
Privacy Pass: Bypassing Internet Challenges Anonymously.
A Davidson, I Goldberg, N Sullivan, G Tankersley, F Valsorda
Proc. Priv. Enhancing Technol. 2018 (3), 164-180, 2018
An efficient toolkit for computing private set operations
A Davidson, C Cid
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017
Round-optimal verifiable oblivious pseudorandom functions from ideal lattices
MR Albrecht, A Davidson, A Deo, NP Smart
Public-Key Cryptography–PKC 2021: 24th IACR International Conference on …, 2021
Oblivious pseudorandom functions (OPRFs) using prime-order groups
A Davidson, N Sullivan, C Wood
Internet-Draft draft-sullivan-cfrg-voprf-03, Internet Engineering Task Force, 2019
Adaptively secure constrained pseudorandom functions in the standard model
A Davidson, S Katsumata, R Nishimaki, S Yamada, T Yamakawa
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
Constrained PRFs for bit-fixing (and more) from OWFs with adaptive security and constant collusion resistance
A Davidson, S Katsumata, R Nishimaki, S Yamada
Cryptology ePrint Archive, 2018
Strong post-compromise secure proxy re-encryption
A Davidson, A Deo, E Lee, K Martin
Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019
Frodopir: Simple, scalable, single-server private information retrieval
A Davidson, G Pestana, S Celi
Cryptology ePrint Archive, 2022
Are graded encoding scheme broken yet
M Albrecht, A Davidson
STAR: Secret Sharing for Private Threshold Aggregation Reporting
A Davidson, P Snyder, EB Quirk, J Genereux, B Livshits, H Haddadi
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
PrivateFetch: Scalable Catalog Delivery in Privacy-Preserving Advertising
M Haris Mughees, G Pestana, A Davidson, B Livshits
arXiv e-prints, arXiv: 2109.08189, 2021
The privacy pass protocol
A Davidson, N Sullivan
Internet-Draft draft-privacypass-0, IETF Secretariat (November 2019), https …, 2019
A bit-fixing prf with O (1) collusion-resistance from lwe
A Davidson, R Nishimaki
Cryptology ePrint Archive, 2018
Notes on GGH13 without the presence of ideals
MR Albrecht, A Davidson, E Larraia
Cryptography and Coding: 16th IMA International Conference, IMACC 2017 …, 2017
Obfuscation of bloom filter queries from ring-LWE
A Davidson
Cryptology ePrint Archive, 2017
A model for secure and mutually beneficial software vulnerability sharing
A Davidson, G Fenn, C Cid
Proceedings of the 2016 ACM on Workshop on Information Sharing and …, 2016
Crypto Dark Matter on the Torus: Oblivious PRFs from shallow PRFs and FHE
MR Albrecht, A Davidson, A Deo, D Gardham
Cryptology ePrint Archive, 2023
Tango or square dance? how tightly should we integrate network functionality in browsers?
A Davidson, M Frei, M Gartner, H Haddadi, A Perrig, JS Nieto, P Winter, ...
Proceedings of the 21st ACM Workshop on Hot Topics in Networks, 205-212, 2022
A Framework for Building Secure, Scalable, Networked Enclaves
P Winter, R Giles, A Davidson, G Pestana
arXiv preprint arXiv:2206.04123, 2022
The system can't perform the operation now. Try again later.
Articles 1–20