Mike Rosulek
Mike Rosulek
Assistant Professor, Oregon State University
Verified email at eecs.oregonstate.edu - Homepage
Title
Cited by
Cited by
Year
Attribute-based signatures
HK Maji, M Prabhakaran, M Rosulek
Cryptographers’ track at the RSA conference, 376-392, 2011
539*2011
Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates
S Zahur, M Rosulek, D Evans
Advances in Cryptology-EUROCRYPT 2015, 220-250, 2015
275*2015
Efficient batched oblivious PRF with applications to private set intersection
V Kolesnikov, R Kumaresan, M Rosulek, N Trieu
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
792016
FleXOR: Flexible garbling for XOR gates that beats free-XOR
V Kolesnikov, P Mohassel, M Rosulek
Annual Cryptology Conference, 440-457, 2014
762014
Fast and secure three-party computation: The garbled circuit approach
P Mohassel, M Rosulek, Y Zhang
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
692015
Rerandomizable RCCA encryption
M Prabhakaran, M Rosulek
Annual International Cryptology Conference, 517-534, 2007
592007
Improved private set intersection against malicious adversaries
P Rindal, M Rosulek
Annual International Conference on the Theory and Applications of …, 2017
552017
Complexity of multi-party computation problems: The case of 2-party symmetric secure function evaluation
HK Maji, M Prabhakaran, M Rosulek
Theory of Cryptography Conference, 256-273, 2009
522009
Homomorphic encryption with CCA security
M Prabhakaran, M Rosulek
International Colloquium on Automata, Languages, and Programming, 667-678, 2008
492008
Faster malicious 2-party secure computation with online/offline dual execution
P Rindal, M Rosulek
25th {USENIX} Security Symposium ({USENIX} Security 16), 297-314, 2016
482016
Practical multi-party private set intersection from symmetric-key techniques
V Kolesnikov, N Matania, B Pinkas, M Rosulek, N Trieu
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
452017
Malicious-secure private set intersection via dual execution
P Rindal, M Rosulek
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
392017
Cryptographic complexity of multi-party computation problems: Classifications and separations
M Prabhakaran, M Rosulek
Annual International Cryptology Conference, 262-279, 2008
382008
A zero-one law for cryptographic complexity with respect to computational UC security
HK Maji, M Prabhakaran, M Rosulek
Annual Cryptology Conference, 595-612, 2010
35*2010
How to efficiently evaluate RAM programs with malicious security
A Afshar, Z Hu, P Mohassel, M Rosulek
Annual International Conference on the Theory and Applications of …, 2015
332015
A pragmatic introduction to secure multi-party computation
D Evans, V Kolesnikov, M Rosulek
Foundations and Trends® in Privacy and Security 2 (2-3), 2017
322017
Garbling gadgets for boolean and arithmetic circuits
M Ball, T Malkin, M Rosulek
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
322016
A unified characterization of completeness and triviality for secure function evaluation
HK Maji, M Prabhakaran, M Rosulek
International Conference on Cryptology in India, 40-59, 2012
272012
PIR-PSI: scaling private contact discovery
D Demmler, P Rindal, M Rosulek, N Trieu
Proceedings on Privacy Enhancing Technologies 2018 (4), 159-178, 2018
202018
Non-interactive secure 2PC in the offline/online and batch settings
P Mohassel, M Rosulek
Annual International Conference on the Theory and Applications of …, 2017
202017
The system can't perform the operation now. Try again later.
Articles 1–20