Privacy-preserving distributed linear regression on high-dimensional data A Gascón, P Schoppmann, B Balle, M Raykova, J Doerner, S Zahur, ... Cryptology ePrint Archive, 2016 | 268 | 2016 |
Scaling ORAM for secure computation J Doerner, A Shelat Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 226 | 2017 |
Secure two-party threshold ECDSA from ECDSA assumptions J Doerner, Y Kondi, E Lee, A Shelat 2018 IEEE Symposium on Security and Privacy (SP), 980-997, 2018 | 200* | 2018 |
Threshold ECDSA from ECDSA assumptions: The multiparty case J Doerner, Y Kondi, E Lee, A Shelat 2019 IEEE Symposium on Security and Privacy (SP), 1051-1066, 2019 | 180 | 2019 |
Revisiting square-root ORAM: efficient random access in multi-party computation S Zahur, X Wang, M Raykova, A Gascón, J Doerner, D Evans, J Katz 2016 IEEE Symposium on Security and Privacy (SP), 218-234, 2016 | 154* | 2016 |
Secure linear regression on vertically partitioned datasets. A Gascón, P Schoppmann, B Balle, M Raykova, J Doerner, S Zahur, ... IACR Cryptol. ePrint Arch. 2016, 892, 2016 | 128 | 2016 |
Secure Stable Matching at Scale J Doerner, D Evans, A Shelat | 64 | 2016 |
Multiparty generation of an RSA modulus M Chen, J Doerner, Y Kondi, E Lee, S Rosefield, A Shelat, R Cohen Journal of Cryptology 35 (2), 12, 2022 | 48 | 2022 |
Threshold bbs+ signatures for distributed anonymous credential issuance J Doerner, Y Kondi, E Lee, A Shelat, LK Tyner 2023 IEEE Symposium on Security and Privacy (SP), 773-789, 2023 | 28 | 2023 |
Threshold ECDSA in three rounds J Doerner, Y Kondi, E Lee, A Shelat 2024 IEEE Symposium on Security and Privacy (SP), 3053-3071, 2024 | 19 | 2024 |
Guaranteed Output in Rounds for Round-Robin Sampling Protocols R Cohen, J Doerner, Y Kondi, A Shelat Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International …, 2022 | 6* | 2022 |
Secure multiparty computation with identifiable abort via vindicating release R Cohen, J Doerner, Y Kondi, A Shelat Annual International Cryptology Conference, 36-73, 2024 | 3 | 2024 |
Constant-Round Simulation-Secure Coin Tossing Extension with Guaranteed Output D Abram, J Doerner, Y Ishai, V Narayanan Annual International Conference on the Theory and Applications of …, 2024 | 3 | 2024 |
Sometimes You Can’t Distribute Random-Oracle-Based Proofs J Doerner, Y Kondi, LN Rosenbloom Annual International Cryptology Conference, 323-358, 2024 | 1 | 2024 |
An Unstoppable Ideal Functionality for Signatures and a Modular Analysis of the Dolev-Strong Broadcast R Cohen, J Doerner, E Lee, A Lysyanskaya, L Roy Cryptology ePrint Archive, 2024 | | 2024 |
Three Useful Threshold Cryptography Problems With Efficient Solutions J Doerner Northeastern University, 2022 | | 2022 |
Poster: Secure Gale-Shapley J Doerner, D Evans, A Shelat | | 2016 |