payman mohassel
payman mohassel
Privacy at Facebook
Geverifieerd e-mailadres voor - Homepage
Geciteerd door
Geciteerd door
Secureml: A system for scalable privacy-preserving machine learning
P Mohassel, Y Zhang
2017 IEEE Symposium on Security and Privacy (SP), 19-38, 2017
ABY3 A Mixed Protocol Framework for Machine Learning
P Mohassel, P Rindal
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Outsourcing multi-party computation
S Kamara, P Mohassel, M Raykova
Cryptology ePrint Archive, Report 2011/272, 2011, 2011
Efficiency tradeoffs for malicious two-party computation
P Mohassel, M Franklin
Public Key Cryptography-PKC 2006, 458-473, 2006
Efficient two party and multi party computation against covert adversaries
V Goyal, P Mohassel, A Smith
Advances in Cryptology --EUROCRYPT 2008, 289-306, 2008
Scaling private set intersection to billion-element sets
S Kamara, P Mohassel, M Raykova, S Sadeghian
International Conference on Financial Cryptography and Data Security, 195-215, 2014
TWORAM: efficient oblivious RAM in two rounds with applications to searchable encryption
S Garg, P Mohassel, C Papamanthou
Annual Cryptology Conference, CRYPTO, 563-592, 2016
Salus: A System for Server-Aided Secure Function Evaluation
S Kamara, P Mohassel, B Riva
ACM Conference on Computer and Communication Security, ACM CCS, 2012, 2012
FleXOR: Flexible garbling for XOR gates that beats free-XOR
V Kolesnikov, P Mohassel, M Rosulek
International Cryptology Conference, CRYPTO, 440-457, 2014
Adaptive trapdoor functions and chosen-ciphertext security
E Kiltz, P Mohassel, A O’Neill
Advances in Cryptology–EUROCRYPT 2010, 673-692, 2010
Fast and secure three-party computation: The garbled circuit approach
P Mohassel, M Rosulek, Y Zhang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Non-interactive secure computation based on cut-and-choose
A Afshar, P Mohassel, B Pinkas, B Riva
Annual International Conference on the Theory and Applications of …, 2014
Efficient and Secure Delegation of Linear Algebra
P Mohassel
Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation.
P Mohassel, B Riva
Advances in Cryptology --CRYPTO 2013 2013, 51, 2013
How to Hide Circuits in MPC: An Efficient Framework for Private Function Evaluation
P Mohassel, S Sadeghian
Advances in Cryptology–EUROCRYPT 2013, 2013
One-time signatures and chameleon hash functions
P Mohassel
International Workshop on Selected Areas in Cryptography, 302-319, 2010
A New Protocol for Oblivious DFA Evaluation and Applications
P Mohassel, S Niksefat, S Sadeghian, B Sadeghiyan
Topics in Cryptology–CT-RSA 2012, 2012
Codedprivateml: A fast and privacy-preserving framework for distributed machine learning
J So, B Guler, AS Avestimehr, P Mohassel
arXiv preprint arXiv:1902.00641, 2019
Secure linear algebra using linearly recurrent sequences
E Kiltz, P Mohassel, E Weinreb, M Franklin
Theory of Cryptography Conference, 2007, 291-310, 2007
How to efficiently evaluate RAM programs with malicious security
A Afshar, Z Hu, P Mohassel, M Rosulek
Annual International Conference on the Theory and Applications of …, 2015
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20