| Functional signatures and pseudorandom functions E Boyle, S Goldwasser, I Ivan International workshop on public key cryptography, 501-519, 2014 | 554 | 2014 |
| Function secret sharing E Boyle, N Gilboa, Y Ishai Annual international conference on the theory and applications of …, 2015 | 527 | 2015 |
| Function secret sharing: Improvements and extensions E Boyle, N Gilboa, Y Ishai Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 472 | 2016 |
| Efficient pseudorandom correlation generators: Silent OT extension and more E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Scholl Annual International Cryptology Conference, 489-518, 2019 | 371 | 2019 |
| Efficient two-round OT extension and silent non-interactive secure computation E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Rindal, P Scholl Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 319 | 2019 |
| Compressing vector OLE E Boyle, G Couteau, N Gilboa, Y Ishai Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 296 | 2018 |
| On extractability obfuscation E Boyle, KM Chung, R Pass Theory of cryptography conference, 52-73, 2014 | 240 | 2014 |
| Breaking the circuit size barrier for secure computation under DDH E Boyle, N Gilboa, Y Ishai Annual International Cryptology Conference, 509-539, 2016 | 233 | 2016 |
| Zero-knowledge proofs on secret-shared data via fully linear PCPs D Boneh, E Boyle, H Corrigan-Gibbs, N Gilboa, Y Ishai Annual international cryptology conference, 67-97, 2019 | 192 | 2019 |
| Function secret sharing for mixed-mode and fixed-point secure computation E Boyle, N Chandran, N Gilboa, D Gupta, Y Ishai, N Kumar, M Rathee Annual International Conference on the Theory and Applications of …, 2021 | 174 | 2021 |
| Lightweight techniques for private heavy hitters D Boneh, E Boyle, H Corrigan-Gibbs, N Gilboa, Y Ishai 2021 IEEE Symposium on Security and Privacy (SP), 762-776, 2021 | 163 | 2021 |
| Secure computation with preprocessing via function secret sharing E Boyle, N Gilboa, Y Ishai Theory of Cryptography Conference, 341-371, 2019 | 157 | 2019 |
| Fully leakage-resilient signatures E Boyle, G Segev, D Wichs Journal of cryptology 26 (3), 513-558, 2013 | 155 | 2013 |
| Efficient pseudorandom correlation generators from ring-LPN E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Scholl Annual International Cryptology Conference, 387-416, 2020 | 151 | 2020 |
| Oblivious parallel RAM and applications E Boyle, KM Chung, R Pass Theory of Cryptography Conference, 175-204, 2015 | 147 | 2015 |
| Homomorphic secret sharing: optimizations and applications E Boyle, G Couteau, N Gilboa, Y Ishai, M Orrù Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 125 | 2017 |
| Homomorphic secret sharing from lattices without FHE E Boyle, L Kohl, P Scholl Annual International Conference on the Theory and Applications of …, 2019 | 116 | 2019 |
| Group-based secure computation: optimizing rounds, communication, and computation E Boyle, N Gilboa, Y Ishai Annual International Conference on the Theory and Applications of …, 2017 | 111 | 2017 |
| Correlated pseudorandom functions from variable-density LPN E Boyle, G Couteau, N Gilboa, Y Ishai, L Kohl, P Scholl 2020 IEEE 61st Annual Symposium on Foundations of Computer Science (FOCS …, 2020 | 107 | 2020 |
| Can we access a database both locally and privately? E Boyle, Y Ishai, R Pass, M Wootters Theory of Cryptography Conference, 662-693, 2017 | 105 | 2017 |