| Three halves make a whole? Beating the half-gates lower bound for garbled circuits M Rosulek, L Roy Annual International Cryptology Conference, 94-124, 2021 | 136 | 2021 |
| Publicly verifiable zero-knowledge and post-quantum signatures from vole-in-the-head C Baum, L Braun, CD de Saint Guilhem, M Klooß, E Orsini, L Roy, ... Annual international cryptology conference, 581-615, 2023 | 121 | 2023 |
| SoftSpokenOT: Quieter OT extension from small-field silent VOLE in the minicrypt model L Roy Annual international cryptology conference, 657-687, 2022 | 107* | 2022 |
| Large message homomorphic secret sharing from DCR and applications L Roy, J Singh Annual International Cryptology Conference, 687-717, 2021 | 72 | 2021 |
| Confidential computing for OpenPOWER GDH Hunt, R Pai, MV Le, H Jamjoom, S Bhattiprolu, R Boivie, L Dufour, ... Proceedings of the Sixteenth European Conference on Computer Systems, 294-310, 2021 | 70 | 2021 |
| One tree to rule them all: Optimizing GGM trees and OWFs for post-quantum signatures C Baum, W Beullens, S Mukherjee, E Orsini, S Ramacher, C Rechberger, ... International Conference on the Theory and Application of Cryptology and …, 2024 | 49 | 2024 |
| Minimal symmetric PAKE and 1-out-of-N OT from programmable-once public functions I McQuoid, M Rosulek, L Roy Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 39 | 2020 |
| Succinct homomorphic secret sharing D Abram, L Roy, P Scholl Annual International Conference on the Theory and Applications of …, 2024 | 28 | 2024 |
| Tensor Field Design in Volumes J Palacios, L Roy, P Kumar, CY Hsu, W Chen, C Ma, LY Wei, E Zhang SIGGRAPH ASIA 2017, 2017 | 27 | 2017 |
| Two-round stateless deterministic two-party schnorr signatures from pseudorandom correlation functions Y Kondi, C Orlandi, L Roy Annual International Cryptology Conference, 646-677, 2023 | 22 | 2023 |
| Batching base oblivious transfers I McQuoid, M Rosulek, L Roy International Conference on the Theory and Application of Cryptology and …, 2021 | 21 | 2021 |
| Robust and fast extraction of 3d symmetric tensor field topology L Roy, P Kumar, Y Zhang, E Zhang IEEE transactions on visualization and computer graphics 25 (1), 1102-1111, 2018 | 20 | 2018 |
| Mode surfaces of symmetric tensor fields: Topological analysis and seamless extraction B Qu, L Roy, Y Zhang, E Zhang IEEE Transactions on Visualization and Computer Graphics 27 (2), 583-592, 2020 | 15 | 2020 |
| Rate-1 arithmetic garbling from homomorphic secret sharing P Meyer, C Orlandi, L Roy, P Scholl Theory of Cryptography Conference, 71-97, 2025 | 14 | 2025 |
| FAEST C Baum, L Braun, CD de Saint Guilhem, M Klooß, C Majenz, S Mukherjee, ... Technical report, National Institute of Standards and Technology, 2023 | 14 | 2023 |
| Under What Conditions Is Encrypted Key Exchange Actually Secure? J Januzelli, L Roy, J Xu Annual International Conference on the Theory and Applications of …, 2025 | 13 | 2025 |
| Silent circuit relinearisation: Sublinear-size (boolean and arithmetic) garbled circuits from DCR P Meyer, C Orlandi, L Roy, P Scholl Annual International Cryptology Conference, 426-458, 2025 | 12 | 2025 |
| Multi-scale topological analysis of asymmetric tensor fields on surfaces F Khan, L Roy, E Zhang, B Qu, SH Hung, H Yeh, RS Laramee, Y Zhang IEEE transactions on visualization and computer graphics 26 (1), 270-279, 2019 | 12 | 2019 |
| Interactive design and visualization of branched covering spaces L Roy, P Kumar, S Golbabaei, Y Zhang, E Zhang IEEE Transactions on Visualization and Computer Graphics 24 (1), 843-852, 2017 | 11 | 2017 |
| Succinct Oblivious Tensor Evaluation and Applications: Adaptively-Secure Laconic Function Evaluation and Trapdoor Hashing for All Circuits D Abram, G Malavolta, L Roy Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 1875-1886, 2025 | 10 | 2025 |