Fingerprint

Fingerprint is based on mining the text of the expert's scholarly documents to create an index of weighted terms, which defines the key subjects of each individual researcher.
  • 1 Similar Profiles

Collaborations and top research areas from the last five years

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • LogRobin++: Optimizing Proofs of Disjunctive Statements in VOLE-Based ZK

    Hazay, C., Heath, D., Kolesnikov, V., Venkitasubramaniam, M. & Yang, Y., 2025, Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Chung, K.-M. & Sasaki, Y. (eds.). Springer, p. 367-401 35 p. (Lecture Notes in Computer Science; vol. 15488 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient Arithmetic in Garbled Circuits

    Heath, D., 2024, Advances in Cryptology – EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2024, Proceedings. Joye, M. & Leander, G. (eds.). Springer, p. 3-31 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14655 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Garbled Circuit Lookup Tables with Logarithmic Number of Ciphertexts

    Heath, D., Kolesnikov, V. & Ng, L. K. L., 2024, Advances in Cryptology – EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2024, Proceedings. Joye, M. & Leander, G. (eds.). Springer, p. 185-215 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14655 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Oblivious Single Access Machines A New Model for Oblivious Computation

    Appan, A., Heath, D. & Ren, L., Dec 9 2024, CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 3080-3094 15 p. (CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • Tight ZK CPU* Batched ZK Branching with Cost Proportional to Evaluated Instruction

    Yang, Y., Heath, D., Hazay, C., Kolesnikov, V. & Venkitasubramaniam, M., Dec 9 2024, CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 3095-3109 15 p. (CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access