[go: up one dir, main page]

Follow
Lawrence Roy
Lawrence Roy
Verified email at cs.au.dk - Homepage
Title
Cited by
Cited by
Year
Three halves make a whole? Beating the half-gates lower bound for garbled circuits
M Rosulek, L Roy
Annual International Cryptology Conference, 94-124, 2021
1362021
Publicly verifiable zero-knowledge and post-quantum signatures from vole-in-the-head
C Baum, L Braun, CD de Saint Guilhem, M Klooß, E Orsini, L Roy, ...
Annual international cryptology conference, 581-615, 2023
1212023
SoftSpokenOT: Quieter OT extension from small-field silent VOLE in the minicrypt model
L Roy
Annual international cryptology conference, 657-687, 2022
107*2022
Large message homomorphic secret sharing from DCR and applications
L Roy, J Singh
Annual International Cryptology Conference, 687-717, 2021
722021
Confidential computing for OpenPOWER
GDH Hunt, R Pai, MV Le, H Jamjoom, S Bhattiprolu, R Boivie, L Dufour, ...
Proceedings of the Sixteenth European Conference on Computer Systems, 294-310, 2021
702021
One tree to rule them all: Optimizing GGM trees and OWFs for post-quantum signatures
C Baum, W Beullens, S Mukherjee, E Orsini, S Ramacher, C Rechberger, ...
International Conference on the Theory and Application of Cryptology and …, 2024
492024
Minimal symmetric PAKE and 1-out-of-N OT from programmable-once public functions
I McQuoid, M Rosulek, L Roy
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
392020
Succinct homomorphic secret sharing
D Abram, L Roy, P Scholl
Annual International Conference on the Theory and Applications of …, 2024
282024
Tensor Field Design in Volumes
J Palacios, L Roy, P Kumar, CY Hsu, W Chen, C Ma, LY Wei, E Zhang
SIGGRAPH ASIA 2017, 2017
272017
Two-round stateless deterministic two-party schnorr signatures from pseudorandom correlation functions
Y Kondi, C Orlandi, L Roy
Annual International Cryptology Conference, 646-677, 2023
222023
Batching base oblivious transfers
I McQuoid, M Rosulek, L Roy
International Conference on the Theory and Application of Cryptology and …, 2021
212021
Robust and fast extraction of 3d symmetric tensor field topology
L Roy, P Kumar, Y Zhang, E Zhang
IEEE transactions on visualization and computer graphics 25 (1), 1102-1111, 2018
202018
Mode surfaces of symmetric tensor fields: Topological analysis and seamless extraction
B Qu, L Roy, Y Zhang, E Zhang
IEEE Transactions on Visualization and Computer Graphics 27 (2), 583-592, 2020
152020
Rate-1 arithmetic garbling from homomorphic secret sharing
P Meyer, C Orlandi, L Roy, P Scholl
Theory of Cryptography Conference, 71-97, 2025
142025
FAEST
C Baum, L Braun, CD de Saint Guilhem, M Klooß, C Majenz, S Mukherjee, ...
Technical report, National Institute of Standards and Technology, 2023
142023
Under What Conditions Is Encrypted Key Exchange Actually Secure?
J Januzelli, L Roy, J Xu
Annual International Conference on the Theory and Applications of …, 2025
132025
Silent circuit relinearisation: Sublinear-size (boolean and arithmetic) garbled circuits from DCR
P Meyer, C Orlandi, L Roy, P Scholl
Annual International Cryptology Conference, 426-458, 2025
122025
Multi-scale topological analysis of asymmetric tensor fields on surfaces
F Khan, L Roy, E Zhang, B Qu, SH Hung, H Yeh, RS Laramee, Y Zhang
IEEE transactions on visualization and computer graphics 26 (1), 270-279, 2019
122019
Interactive design and visualization of branched covering spaces
L Roy, P Kumar, S Golbabaei, Y Zhang, E Zhang
IEEE Transactions on Visualization and Computer Graphics 24 (1), 843-852, 2017
112017
Succinct Oblivious Tensor Evaluation and Applications: Adaptively-Secure Laconic Function Evaluation and Trapdoor Hashing for All Circuits
D Abram, G Malavolta, L Roy
Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 1875-1886, 2025
102025
The system can't perform the operation now. Try again later.
Articles 1–20