| Key homomorphic PRFs and their applications D Boneh, K Lewi, H Montgomery, A Raghunathan Annual Cryptology Conference, 410-428, 2013 | 487 | 2013 |
| Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation D Boneh, K Lewi, M Raykova, A Sahai, M Zhandry, J Zimmerman Annual International Conference on the Theory and Applications of …, 2015 | 315 | 2015 |
| Order-revealing encryption: New constructions, applications, and lower bounds K Lewi, DJ Wu Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 275 | 2016 |
| Function-hiding inner product encryption is practical S Kim, K Lewi, A Mandal, H Montgomery, A Roy, DJ Wu International Conference on Security and Cryptography for Networks, 544-562, 2018 | 239 | 2018 |
| Practical order-revealing encryption with limited leakage N Chenette, K Lewi, SA Weis, DJ Wu International conference on fast software encryption, 474-493, 2016 | 239 | 2016 |
| Preventing Unraveling in Social Networks: The Anchored -Core Problem K Bhawalkar, J Kleinberg, K Lewi, T Roughgarden, A Sharma SIAM Journal on Discrete Mathematics 29 (3), 1452-1475, 2015 | 175 | 2015 |
| Constraining pseudorandom functions privately D Boneh, K Lewi, DJ Wu IACR International Workshop on Public Key Cryptography, 494-524, 2017 | 120 | 2017 |
| Losing weight by gaining edges A Abboud, K Lewi, R Williams European Symposium on Algorithms, 1-12, 2014 | 84 | 2014 |
| The libra blockchain Z Amsden, R Arora, S Bano, M Baudet, S Blackshear, A Bothra, ... URl: https://developers. libra. org/docs/assets/papers/the-libra-blockchain. pdf, 2019 | 77 | 2019 |
| Exact Weight Subgraphs and the k-Sum Conjecture A Abboud, K Lewi International Colloquium on Automata, Languages, and Programming, 1-12, 2013 | 77 | 2013 |
| The online metric matching problem for doubling metrics A Gupta, K Lewi International Colloquium on Automata, Languages, and Programming, 424-435, 2012 | 76 | 2012 |
| Parakeet: Practical key transparency for end-to-end encrypted messaging H Malvai, L Kokoris-Kogias, A Sonnino, E Ghosh, E Oztürk, K Lewi, ... Cryptology ePrint Archive, 2023 | 69 | 2023 |
| Aggregating and thresholdizing hash-based signatures using STARKs I Khaburzaniya, K Chalkias, K Lewi, H Malvai Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 45* | 2022 |
| 5gen: A framework for prototyping applications using multilinear maps and matrix branching programs K Lewi, AJ Malozemoff, D Apon, B Carmer, A Foltzer, D Wagner, ... Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 44 | 2016 |
| Improved constructions of PRFs secure against related-key attacks K Lewi, H Montgomery, A Raghunathan International Conference on Applied Cryptography and Network Security, 44-61, 2014 | 34 | 2014 |
| Distributed auditing proofs of liabilities K Chalkias, K Lewi, P Mohassel, V Nikolaenko Cryptology ePrint Archive, 2020 | 28 | 2020 |
| Deploying key transparency at WhatsApp S Lawlor, K Lewi Retrieved November 27, 2023, 2023 | 25 | 2023 |
| Securing update propagation with homomorphic hashing K Lewi, W Kim, I Maykov, S Weis Cryptology ePrint Archive, 2019 | 17 | 2019 |
| Hashwires: Hyperefficient credential-based range proofs K Chalkias, S Cohen, K Lewi, F Moezinia, Y Romailler Cryptology ePrint Archive, 2021 | 15 | 2021 |
| WhisPIR: Stateless private information retrieval with low communication L de Castro, K Lewi, E Suh Cryptology ePrint Archive, 2024 | 13 | 2024 |