Follow
Alex J. Malozemoff
Alex J. Malozemoff
Galois
Verified email at galois.com
Title
Cited by
Cited by
Year
EMP-toolkit: Efficient MultiParty computation toolkit
X Wang, AJ Malozemoff, J Katz
1752016
Amortizing garbled circuits
Y Huang, J Katz, V Kolesnikov, R Kumaresan, AJ Malozemoff
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
952014
Faster secure two-party computation in the single-execution setting
X Wang, AJ Malozemoff, J Katz
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
582017
Implementing cryptographic program obfuscation
D Apon, Y Huang, J Katz, AJ Malozemoff
IACR Cryptology ePrint Archive 2014 (2014/779), 2014
582014
: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested Disjunctions
C Baum, AJ Malozemoff, MB Rosen, P Scholl
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
562021
Automated analysis and synthesis of authenticated encryption schemes
VT Hoang, J Katz, AJ Malozemoff
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
402015
Efficient three-party computation from cut-and-choose
SG Choi, J Katz, AJ Malozemoff, V Zikas
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
392014
Automated analysis and synthesis of block-cipher modes of operation
AJ Malozemoff, J Katz, MD Green
2014 IEEE 27th Computer Security Foundations Symposium, 140-152, 2014
362014
5Gen: A framework for prototyping applications using multilinear maps and matrix branching programs
K Lewi, AJ Malozemoff, D Apon, B Carmer, A Foltzer, D Wagner, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
352016
EMP-toolkit: efficient MultiParty computation toolkit (2016)
X Wang, AJ Malozemoff, J Katz
282021
Public verifiability in the covert model (almost) for free
V Kolesnikov, AJ Malozemoff
Advances in Cryptology–ASIACRYPT 2015: 21st International Conference on the …, 2015
272015
Ramparts: A programmer-friendly system for building homomorphic encryption applications
DW Archer, JM Calderón Trilla, J Dagit, A Malozemoff, Y Polyakov, ...
Proceedings of the 7th acm workshop on encrypted computing & applied …, 2019
262019
A standard API for RLWE-based homomorphic encryption
M Brenner, W Dai, S Halevi, K Han, A Jalali, M Kim, K Laine, ...
Technical report, HomomorphicEncryption. org, Redmond WA, 2017
232017
CompGC: efficient offline/online semi-honest two-party computation.
A Groce, A Ledger, AJ Malozemoff, A Yerukhimovich
IACR Cryptology ePrint Archive 2016 (2016/458), 2016
232016
Efficiently enforcing input validity in secure two-party computation
J Katz, AJ Malozemoff, XS Wang
IACR Cryptology ePrint Archive 2016 (2016/184), 2016
202016
5Gen-C: Multi-input functional encryption and program obfuscation for arithmetic circuits
B Carmer, AJ Malozemoff, M Raykova
Proceedings of the 24th ACM SIGSAC Conference on Computer and Communications …, 2017
172017
Attribute-based key exchange with general policies
V Kolesnikov, H Krawczyk, Y Lindell, A Malozemoff, T Rabin
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
162016
A unified approach to idealized model separations via indistinguishability obfuscation
MD Green, J Katz, AJ Malozemoff, HS Zhou
Security and Cryptography for Networks: 10th International Conference, SCN …, 2016
152016
Faster two-party computation secure against malicious adversaries in the single-execution setting
X Wang, AJ Malozemoff, J Katz
Cryptology ePrint Archive, 2016
102016
Public-key function-private hidden vector encryption (and more)
J Bartusek, B Carmer, A Jain, Z Jin, T Lepoint, F Ma, T Malkin, ...
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
72019
The system can't perform the operation now. Try again later.
Articles 1–20