payman mohassel
payman mohassel
Visa Research
Verified email at visa.com - Homepage
Title
Cited by
Cited by
Year
Secureml: A system for scalable privacy-preserving machine learning
P Mohassel, Y Zhang
2017 IEEE Symposium on Security and Privacy (SP), 19-38, 2017
4492017
Outsourcing multi-party computation
S Kamara, P Mohassel, M Raykova
Cryptology ePrint Archive, Report 2011/272, 2011, 2011
1662011
Efficiency tradeoffs for malicious two-party computation
P Mohassel, M Franklin
Public Key Cryptography-PKC 2006, 458-473, 2006
1562006
ABY3 A Mixed Protocol Framework for Machine Learning
P Mohassel, P Rindal
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1182018
Efficient two party and multi party computation against covert adversaries
V Goyal, P Mohassel, A Smith
Advances in Cryptology --EUROCRYPT 2008, 289-306, 2008
1022008
Scaling private set intersection to billion-element sets
S Kamara, P Mohassel, M Raykova, S Sadeghian
International Conference on Financial Cryptography and Data Security, 195-215, 2014
942014
Salus: A System for Server-Aided Secure Function Evaluation
S Kamara, P Mohassel, B Riva
ACM Conference on Computer and Communication Security, ACM CCS, 2012, 2012
922012
Adaptive trapdoor functions and chosen-ciphertext security
E Kiltz, P Mohassel, A O’Neill
Advances in Cryptology–EUROCRYPT 2010, 673-692, 2010
812010
FleXOR: Flexible garbling for XOR gates that beats free-XOR
V Kolesnikov, P Mohassel, M Rosulek
International Cryptology Conference, CRYPTO, 440-457, 2014
782014
Non-interactive secure computation based on cut-and-choose
A Afshar, P Mohassel, B Pinkas, B Riva
Annual International Conference on the Theory and Applications of …, 2014
762014
TWORAM: efficient oblivious RAM in two rounds with applications to searchable encryption
S Garg, P Mohassel, C Papamanthou
Annual Cryptology Conference, CRYPTO, 563-592, 2016
732016
Fast and secure three-party computation: The garbled circuit approach
P Mohassel, M Rosulek, Y Zhang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
702015
Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation.
P Mohassel, B Riva
Advances in Cryptology --CRYPTO 2013 2013, 51, 2013
632013
Efficient and Secure Delegation of Linear Algebra
P Mohassel
632012
How to Hide Circuits in MPC: An Efficient Framework for Private Function Evaluation
P Mohassel, S Sadeghian
Advances in Cryptology–EUROCRYPT 2013, 2013
562013
A New Protocol for Oblivious DFA Evaluation and Applications
P Mohassel, S Niksefat, S Sadeghian, B Sadeghiyan
Topics in Cryptology–CT-RSA 2012, 2012
53*2012
One-time signatures and chameleon hash functions
P Mohassel
International Workshop on Selected Areas in Cryptography, 302-319, 2010
522010
Secure linear algebra using linearly recurrent sequences
E Kiltz, P Mohassel, E Weinreb, M Franklin
Theory of Cryptography Conference, 2007, 291-310, 2007
372007
How to efficiently evaluate RAM programs with malicious security
A Afshar, Z Hu, P Mohassel, M Rosulek
Annual International Conference on the Theory and Applications of …, 2015
332015
A closer look at anonymity and robustness in encryption schemes
P Mohassel
International Conference on the Theory and Application of Cryptology and …, 2010
332010
The system can't perform the operation now. Try again later.
Articles 1–20