brett hemenway falk
brett hemenway falk
Verified email at - Homepage
Cited by
Cited by
Sok: General purpose compilers for secure multi-party computation
M Hastings, B Hemenway, D Noble, S Zdancewic
2019 IEEE symposium on security and privacy (SP), 1220-1237, 2019
Lossy encryption: Constructions from general assumptions and efficient selective opening chosen ciphertext security
B Hemenway, B Libert, R Ostrovsky, D Vergnaud
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on theá…, 2011
Token-weighted crowdsourcing
G Tsoukalas, BH Falk
Management Science 66 (9), 3843-3859, 2020
Extended-DDH and lossy trapdoor functions
B Hemenway, R Ostrovsky
International Workshop on Public Key Cryptography, 627-643, 2012
Honeycrisp: large-scale differentially private aggregation without a trusted core
E Roth, D Noble, BH Falk, A Haeberlen
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 196-210, 2019
Adaptively secure garbled circuits from one-way functions
B Hemenway, Z Jafargholi, R Ostrovsky, A Scafuro, D Wichs
Annual International Cryptology Conference, 149-178, 2016
Private set intersection with linear communication from general assumptions
B Hemenway Falk, D Noble, R Ostrovsky
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 14-25, 2019
High-precision secure computation of satellite collision probabilities
B Hemenway, S Lu, R Ostrovsky, W Welser Iv
Security and Cryptography for Networks: 10th International Conference, SCNá…, 2016
Local correctability of expander codes
B Hemenway, R Ostrovsky, M Wootters
Information and Computation 243, 178-190, 2015
Global brain dynamics during social exclusion predict subsequent behavioral conformity
N Wasylyshyn, B Hemenway Falk, JO Garcia, CN Cascio, MB O’Donnell, ...
Social Cognitive and Affective Neuroscience 13 (2), 182-191, 2018
Public-key locally-decodable codes
B Hemenway, R Ostrovsky
Advances in Cryptology–CRYPTO 2008, 126-143, 2008
Local list recovery of high-rate tensor codes and applications
B Hemenway, N Ron-Zewi, M Wootters
SIAM Journal on Computing 49 (4), FOCS17-157-FOCS17-195, 2019
Recovering simple signals
AC Gilbert, B Hemenway, A Rudra, MJ Strauss, M Wootters
2012 Information Theory and Applications Workshop, 382-391, 2012
Scaling blockchains: Can committee-based consensus help?
A Benhaim, BH Falk, G Tsoukalas
Management Science 69 (11), 6525-6539, 2023
Linear-time list recovery of high-rate expander codes
B Hemenway, M Wootters
Information and Computation 261, 202-218, 2018
Building lossy trapdoor functions from lossy encryption
B Hemenway, R Ostrovsky
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on theá…, 2013
On homomorphic encryption and chosen-ciphertext security
B Hemenway, R Ostrovsky
International workshop on public key cryptography, 52-65, 2012
Sensitivity and computational complexity in financial networks
B Hemenway, S Khanna
Algorithmic Finance 5 (3-4), 95-110, 2016
Satellite anomalies: Benefits of a centralized anomaly database and methods for securely sharing information among satellite operators
DA Galvan, W Welser IV, B Hemenway, D Baiocchi
Rand Corporation, 2014
Non-committing encryption from Φ-hiding
B Hemenway, R Ostrovsky, A Rosen
Theory of Cryptography Conference, 591-608, 2015
The system can't perform the operation now. Try again later.
Articles 1–20