Follow
brett hemenway falk
brett hemenway falk
Verified email at cis.upenn.edu - Homepage
Title
Cited by
Cited by
Year
Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security
B Hemenway, B Libert, R Ostrovsky, D Vergnaud
International Conference on the Theory and Application of Cryptology and …, 2011
1152011
Sok: General purpose compilers for secure multi-party computation
M Hastings, B Hemenway, D Noble, S Zdancewic
2019 IEEE symposium on security and privacy (SP), 1220-1237, 2019
1122019
Extended-DDH and lossy trapdoor functions
B Hemenway, R Ostrovsky
International Workshop on Public Key Cryptography, 627-643, 2012
79*2012
Token-weighted crowdsourcing
G Tsoukalas, BH Falk
Management Science 66 (9), 3843-3859, 2020
55*2020
Adaptively secure garbled circuits from one-way functions
B Hemenway, Z Jafargholi, R Ostrovsky, A Scafuro, D Wichs
Annual International Cryptology Conference, 149-178, 2016
522016
Public-key locally-decodable codes
B Hemenway, R Ostrovsky
Advances in Cryptology–CRYPTO 2008, 126-143, 2008
41*2008
Local correctability of expander codes
B Hemenway, R Ostrovsky, M Wootters
Information and Computation 243, 178-190, 2015
392015
Recovering simple signals
AC Gilbert, B Hemenway, A Rudra, MJ Strauss, M Wootters
2012 Information Theory and Applications Workshop, 382-391, 2012
392012
Private set intersection with linear communication from general assumptions
B Hemenway Falk, D Noble, R Ostrovsky
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 14-25, 2019
352019
High-precision secure computation of satellite collision probabilities
B Hemenway, S Lu, R Ostrovsky, W Welser Iv
International Conference on Security and Cryptography for Networks, 169-187, 2016
352016
Local list recovery of high-rate tensor codes and applications
B Hemenway, N Ron-Zewi, M Wootters
SIAM Journal on Computing 49 (4), FOCS17-157-FOCS17-195, 2019
322019
Honeycrisp: large-scale differentially private aggregation without a trusted core
E Roth, D Noble, BH Falk, A Haeberlen
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 196-210, 2019
312019
Global brain dynamics during social exclusion predict subsequent behavioral conformity
N Wasylyshyn, B Hemenway Falk, JO Garcia, CN Cascio, MB O’Donnell, ...
Social Cognitive and Affective Neuroscience 13 (2), 182-191, 2018
302018
On homomorphic encryption and chosen-ciphertext security
B Hemenway, R Ostrovsky
International Workshop on Public Key Cryptography, 52-65, 2012
29*2012
Linear-time list recovery of high-rate expander codes
B Hemenway, M Wootters
Information and Computation 261, 202-218, 2018
272018
Building lossy trapdoor functions from lossy encryption
B Hemenway, R Ostrovsky
International Conference on the Theory and Application of Cryptology and …, 2013
27*2013
Satellite anomalies: Benefits of a centralized anomaly database and methods for securely sharing information among satellite operators
DA Galvan, B Hemenway, IV Welser, D Baiocchi
RAND NATIONAL DEFENSE RESEARCH INST SANTA MONICA CA, 2014
252014
Non-committing encryption from Φ-hiding
B Hemenway, R Ostrovsky, A Rosen
Theory of Cryptography Conference, 591-608, 2015
242015
Sensitivity and computational complexity in financial networks
B Hemenway, S Khanna
Algorithmic Finance 5 (3-4), 95-110, 2016
192016
Public key locally decodable codes with short keys
B Hemenway, R Ostrovsky, MJ Strauss, M Wootters
Approximation, Randomization, and Combinatorial Optimization. Algorithms and …, 2011
162011
The system can't perform the operation now. Try again later.
Articles 1–20