Follow
Jack Doerner
Jack Doerner
Verified email at ccs.neu.edu - Homepage
Title
Cited by
Cited by
Year
Privacy-preserving distributed linear regression on high-dimensional data
A Gascón, P Schoppmann, B Balle, M Raykova, J Doerner, S Zahur, ...
Cryptology ePrint Archive, 2016
2412016
Scaling ORAM for secure computation
J Doerner, A Shelat
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1722017
Secure two-party threshold ECDSA from ECDSA assumptions
J Doerner, Y Kondi, E Lee, A Shelat
2018 IEEE Symposium on Security and Privacy (SP), 980-997, 2018
148*2018
Revisiting square-root ORAM: efficient random access in multi-party computation
S Zahur, X Wang, M Raykova, A Gascón, J Doerner, D Evans, J Katz
2016 IEEE Symposium on Security and Privacy (SP), 218-234, 2016
137*2016
Threshold ECDSA from ECDSA assumptions: The multiparty case
J Doerner, Y Kondi, E Lee, A Shelat
2019 IEEE Symposium on Security and Privacy (SP), 1051-1066, 2019
1162019
Secure linear regression on vertically partitioned datasets.
A Gascón, P Schoppmann, B Balle, M Raykova, J Doerner, S Zahur, ...
IACR Cryptol. ePrint Arch. 2016, 892, 2016
1032016
Secure Stable Matching at Scale
J Doerner, D Evans, A Shelat
552016
Multiparty generation of an RSA modulus
M Chen, J Doerner, Y Kondi, E Lee, S Rosefield, A Shelat, R Cohen
Journal of Cryptology 35 (2), 12, 2022
332022
Threshold bbs+ signatures for distributed anonymous credential issuance
J Doerner, Y Kondi, E Lee, A Shelat, LK Tyner
2023 IEEE Symposium on Security and Privacy (SP), 773-789, 2023
122023
Guaranteed Output in Rounds for Round-Robin Sampling Protocols
R Cohen, J Doerner, Y Kondi, A Shelat
Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International …, 2022
3*2022
Threshold ECDSA in Three Rounds
J Doerner, Y Kondi, E Lee
Cryptology ePrint Archive, 2023
12023
Sometimes You Can’t Distribute Random-Oracle-Based Proofs
J Doerner, Y Kondi, LN Rosenbloom
Cryptology ePrint Archive, 2023
2023
Secure Multiparty Computation with Identifiable Abort from Vindicating Release
R Cohen, J Doerner, Y Kondi
Cryptology ePrint Archive, 2023
2023
Three Useful Threshold Cryptography Problems With Efficient Solutions
J Doerner
Northeastern University, 2022
2022
Poster: Secure Gale-Shapley
J Doerner, D Evans, A Shelat
2016
The system can't perform the operation now. Try again later.
Articles 1–15