Spacemint: A cryptocurrency based on proofs of space S Park, A Kwon, G Fuchsbauer, P Gaži, J Alwen, K Pietrzak International Conference on Financial Cryptography and Data Security, 480-499, 2018 | 210 | 2018 |
Going from bad to worse: from internet voting to blockchain voting S Park, M Specter, N Narula, RL Rivest Journal of Cybersecurity 7 (1), tyaa025, 2021 | 53 | 2021 |
Practical accountability of secret processes J Frankle, S Park, D Shaar, S Goldwasser, D Weitzner 27th USENIX Security Symposium (USENIX Security 18), 657-674, 2018 | 48 | 2018 |
Is public-key encryption based on LPN practical? I Damgård, S Park IACR Cryptol. ePrint Arch. 2012, 699, 2012 | 27 | 2012 |
Adaptively secure coin-flipping, revisited S Goldwasser, YT Kalai, S Park International Colloquium on Automata, Languages, and Programming, 663-674, 2015 | 23 | 2015 |
Fully deniable interactive encryption R Canetti, S Park, O Poburinnaya Annual International Cryptology Conference, 807-835, 2020 | 21 | 2020 |
Public accountability vs. secret laws: can they coexist? A cryptographic proposal S Goldwasser, S Park Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, 99-110, 2017 | 19 | 2017 |
Towards secure quadratic voting S Park, RL Rivest Public Choice 172 (1), 151-175, 2017 | 16 | 2017 |
How to incentivize data-driven collaboration among competing parties PD Azar, S Goldwasser, S Park Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016 | 14 | 2016 |
How practical is public-key encryption based on LPN and ring-LPN? I Damgård, S Park Cryptology ePrint Archive, 2012 | 14 | 2012 |
How to subvert backdoored encryption: security against adversaries that decrypt all ciphertexts T Horel, S Park, S Richelson, V Vaikuntanathan arXiv preprint arXiv:1802.07381, 2018 | 13 | 2018 |
It wasn’t me! S Park, A Sealfon Annual International Cryptology Conference, 159-190, 2019 | 11 | 2019 |
Data structures meet cryptography: 3sum with preprocessing A Golovnev, S Guo, T Horel, S Park, V Vaikuntanathan Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing …, 2020 | 8 | 2020 |
3SUM with preprocessing: Algorithms, lower bounds and cryptographic applications A Golovnev, S Guo, T Horel, S Park, V Vaikuntanathan arXiv preprint arXiv:1907.08355, 2019 | 8 | 2019 |
Non-malleable commitments from non-malleable extractors V Goyal, A Kumar, S Park, S Richelson, A Srinivasan Manuscript, accessed via personal communication, 2018 | 7 | 2018 |
Static-memory-hard functions, and modeling the cost of space vs. time T Dryja, QC Liu, S Park Theory of Cryptography Conference, 33-66, 2018 | 5 | 2018 |
Spacecoin: a cryptocurrency based on proofs of space J Alwen, G Fuchsbauer, P Gazi, S Park, K Pietrzak IACR Cryptol. ePrint Arch, 1-26, 2015 | 5 | 2015 |
AUDIT: Practical accountability of secret processes J Frankle, S Park, D Shaar, S Goldwasser, DJ Weitzner Cryptology ePrint Archive, 2018 | 3 | 2018 |
Public Accountability vs. Secret Laws: Can They Coexist? S Goldwasser, S Park Cryptology ePrint Archive, 2018 | 3 | 2018 |
On time and order in multiparty computation P Azar, S Goldwasser, S Park Cryptology ePrint Archive. Report 2015/178, 2015 | 3 | 2015 |