A more complete analysis of the signal double ratchet algorithm A Bienstock, J Fairoze, S Garg, P Mukherjee, S Raghuraman Advances in Cryptology–CRYPTO 2022: 42nd Annual International Cryptology …, 2022 | 43 | 2022 |
On the price of concurrency in group ratcheting protocols A Bienstock, Y Dodis, P Rösler Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020 | 41 | 2020 |
Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume-Hiding Multi-Maps A Bienstock, S Patel, JY Seo, K Yeo USENIX Security 2023, 2023 | 32 | 2023 |
On the worst-case inefficiency of CGKA A Bienstock, Y Dodis, S Garg, G Grogan, M Hajiabadi, P Rösler Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL …, 2022 | 14 | 2022 |
On linear communication complexity for (maximally) fluid MPC A Bienstock, D Escudero, A Polychroniadou Annual International Cryptology Conference, 263-294, 2023 | 9 | 2023 |
Multicast Key Agreement, Revisited A Bienstock, Y Dodis, Y Tang Cryptographers’ Track at the RSA Conference, 1-25, 2022 | 8 | 2022 |
Batch PIR and Labeled PSI with Oblivious Ciphertext Compression A Bienstock, S Patel, JY Seo, K Yeo USENIX Security 2024, 2024 | 6 | 2024 |
Asmesh: Anonymous and secure messaging in mesh networks using stronger, anonymous double ratchet A Bienstock, P Rösler, Y Tang Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 6 | 2023 |
Forward Secret Encrypted RAM: Lower Bounds and Applications A Bienstock, Y Dodis, K Yeo Theory of Cryptography Conference, 2021 | 6 | 2021 |
Towards topology-hiding computation from oblivious transfer M Ball, A Bienstock, L Kohl, P Meyer Theory of Cryptography Conference, 349-379, 2023 | 4 | 2023 |
Honest Majority GOD MPC with Rounds and Low Online Communication A Agarwal, A Bienstock, I Damgård, D Escudero International Conference on the Theory and Application of Cryptology and …, 2025 | | 2025 |
Interval key-encapsulation mechanism A Bienstock, Y Dodis, P Rösler, D Wichs International Conference on the Theory and Application of Cryptology and …, 2025 | | 2025 |
On Efficient Instantiations of Secure Multi-Party Computation in Practice A Bienstock New York University, 2024 | | 2024 |
Perfectly Secure Fluid MPC with Abort and Linear Communication Complexity A Bienstock, D Escudero, A Polychroniadou Cryptology ePrint Archive, 2024 | | 2024 |
DMM: Distributed Matrix Mechanism for Differentially-Private Federated Learning using Packed Secret Sharing A Bienstock, U Kumar, A Polychroniadou Cryptology ePrint Archive, 2024 | | 2024 |
Two Levels are Better than One: Dishonest Majority MPC with Total Communication A Bienstock, K Yeo Cryptology ePrint Archive, 2024 | | 2024 |
From discrete-log to lattices: maybe the real lessons were our broken schemes along the way? A Bienstock, A Bishop, E Goldin, G Grogan, V Lecomte IACR Cryptol. ePrint Arch. 2020, 164, 2020 | | 2020 |