ติดตาม
Kevin Lewi
Kevin Lewi
Facebook
ยืนยันอีเมลแล้วที่ cs.stanford.edu - หน้าแรก
ชื่อ
อ้างโดย
อ้างโดย
ปี
Key homomorphic PRFs and their applications
D Boneh, K Lewi, H Montgomery, A Raghunathan
Annual Cryptology Conference, 410-428, 2013
4352013
Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation
D Boneh, K Lewi, M Raykova, A Sahai, M Zhandry, J Zimmerman
Annual International Conference on the Theory and Applications of …, 2015
3042015
Order-revealing encryption: New constructions, applications, and lower bounds
K Lewi, DJ Wu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
2642016
Practical order-revealing encryption with limited leakage
N Chenette, K Lewi, SA Weis, DJ Wu
Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum …, 2016
2292016
Function-hiding inner product encryption is practical
S Kim, K Lewi, A Mandal, H Montgomery, A Roy, DJ Wu
International Conference on Security and Cryptography for Networks, 544-562, 2018
2062018
Preventing Unraveling in Social Networks: The Anchored -Core Problem
K Bhawalkar, J Kleinberg, K Lewi, T Roughgarden, A Sharma
SIAM Journal on Discrete Mathematics 29 (3), 1452-1475, 2015
1622015
Constraining pseudorandom functions privately
D Boneh, K Lewi, DJ Wu
IACR International Workshop on Public Key Cryptography, 494-524, 2017
1092017
Losing weight by gaining edges
A Abboud, K Lewi, R Williams
Algorithms-ESA 2014: 22th Annual European Symposium, Wroclaw, Poland …, 2014
77*2014
The libra blockchain
Z Amsden, R Arora, S Bano, M Baudet, S Blackshear, A Bothra, ...
URl: https://developers. libra. org/docs/assets/papers/the-libra-blockchain. pdf, 2019
712019
The online metric matching problem for doubling metrics
A Gupta, K Lewi
Automata, Languages, and Programming: 39th International Colloquium, ICALP …, 2012
682012
Exact Weight Subgraphs and the k-Sum Conjecture
A Abboud, K Lewi
International Colloquium on Automata, Languages, and Programming, 1-12, 2013
672013
Parakeet: Practical key transparency for end-to-end encrypted messaging
H Malvai, L Kokoris-Kogias, A Sonnino, E Ghosh, E Oztürk, K Lewi, ...
Cryptology ePrint Archive, 2023
392023
5gen: A framework for prototyping applications using multilinear maps and matrix branching programs
K Lewi, AJ Malozemoff, D Apon, B Carmer, A Foltzer, D Wagner, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
392016
Improved constructions of PRFs secure against related-key attacks
K Lewi, H Montgomery, A Raghunathan
Applied Cryptography and Network Security: 12th International Conference …, 2014
322014
Aggregating and thresholdizing hash-based signatures using STARKs
I Khaburzaniya, K Chalkias, K Lewi, H Malvai
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
29*2022
Distributed auditing proofs of liabilities
K Chalkias, K Lewi, P Mohassel, V Nikolaenko
Cryptology ePrint Archive, 2020
222020
Securing update propagation with homomorphic hashing
K Lewi, W Kim, I Maykov, S Weis
Cryptology ePrint Archive, 2019
112019
Iterating Inverse Binary Transducers.
K Sutner, K Lewi
J. Autom. Lang. Comb. 17 (2-4), 293-313, 2012
10*2012
HashWires: Hyperefficient credential-based range proofs
K Chalkias, S Cohen, K Lewi, F Moezinia, Y Romailler
Cryptology ePrint Archive, 2021
82021
Strobe: Stake-based threshold random beacons
D Beaver, K Chalkias, M Kelkar, LK Kogias, K Lewi, L de Naurois, ...
Cryptology ePrint Archive, 2021
62021
ระบบไม่สามารถดำเนินการได้ในขณะนี้ โปรดลองใหม่อีกครั้งในภายหลัง
บทความ 1–20