Follow
Alex J. Malozemoff
Alex J. Malozemoff
Galois
Verified email at galois.com
Title
Cited by
Cited by
Year
EMP-toolkit: Efficient MultiParty computation toolkit
X Wang, AJ Malozemoff, J Katz
3222016
: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions
C Baum, AJ Malozemoff, MB Rosen, P Scholl
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
1182021
Amortizing garbled circuits
Y Huang, J Katz, V Kolesnikov, R Kumaresan, AJ Malozemoff
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
1002014
Faster secure two-party computation in the single-execution setting
X Wang, AJ Malozemoff, J Katz
Annual international conference on the theory and applications of …, 2017
672017
Ramparts: A programmer-friendly system for building homomorphic encryption applications
DW Archer, JM Calderón Trilla, J Dagit, A Malozemoff, Y Polyakov, ...
Proceedings of the 7th acm workshop on encrypted computing & applied …, 2019
622019
Implementing cryptographic program obfuscation
D Apon, Y Huang, J Katz, AJ Malozemoff
IACR Cryptology ePrint Archive 2014 (2014/779), 2014
612014
Efficient three-party computation from cut-and-choose
SG Choi, J Katz, AJ Malozemoff, V Zikas
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
462014
Automated analysis and synthesis of authenticated encryption schemes
VT Hoang, J Katz, AJ Malozemoff
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
442015
Automated analysis and synthesis of block-cipher modes of operation
AJ Malozemoff, J Katz, MD Green
2014 IEEE 27th Computer Security Foundations Symposium, 140-152, 2014
402014
5Gen: A framework for prototyping applications using multilinear maps and matrix branching programs
K Lewi, AJ Malozemoff, D Apon, B Carmer, A Foltzer, D Wagner, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
392016
Public verifiability in the covert model (almost) for free
V Kolesnikov, AJ Malozemoff
International Conference on the Theory and Application of Cryptology and …, 2015
292015
A standard API for RLWE-based homomorphic encryption
M Brenner, W Dai, S Halevi, K Han, A Jalali, M Kim, K Laine, ...
Technical report, HomomorphicEncryption. org, Redmond WA, 2017
262017
Efficiently enforcing input validity in secure two-party computation
J Katz, AJ Malozemoff, XS Wang
IACR Cryptology ePrint Archive 2016 (2016/184), 2016
242016
CompGC: efficient offline/online semi-honest two-party computation.
A Groce, A Ledger, AJ Malozemoff, A Yerukhimovich
IACR Cryptology ePrint Archive 2016 (2016/458), 2016
232016
5Gen-C: Multi-input functional encryption and program obfuscation for arithmetic circuits
B Carmer, AJ Malozemoff, M Raykova
Proceedings of the 24th ACM SIGSAC Conference on Computer and Communications …, 2017
212017
Attribute-based key exchange with general policies
V Kolesnikov, H Krawczyk, Y Lindell, A Malozemoff, T Rabin
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
202016
Balboa: Bobbing and weaving around network censorship
MB Rosen, J Parker, AJ Malozemoff
30th USENIX Security Symposium (USENIX Security 21), 3399-3413, 2021
182021
Towards a formal treatment of logic locking
P Beerel, M Georgiou, B Hamlin, AJ Malozemoff, P Nuzzo
Cryptology ePrint Archive, 2022
162022
A unified approach to idealized model separations via indistinguishability obfuscation
MD Green, J Katz, AJ Malozemoff, HS Zhou
International Conference on Security and Cryptography for Networks, 587-603, 2016
152016
Building applications with homomorphic encryption
RA Hallman, K Laine, W Dai, N Gama, AJ Malozemoff, Y Polyakov, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
122018
The system can't perform the operation now. Try again later.
Articles 1–20