Alex J. Malozemoff
Alex J. Malozemoff
Galois
Verified email at galois.com
Title
Cited by
Cited by
Year
Amortizing garbled circuits
Y Huang, J Katz, V Kolesnikov, R Kumaresan, AJ Malozemoff
Annual Cryptology Conference, 458-475, 2014
782014
EMP-toolkit: Efficient MultiParty computation toolkit
X Wang, AJ Malozemoff, J Katz
492016
Implementing cryptographic program obfuscation
D Apon, Y Huang, J Katz, AJ Malozemoff
IACR Cryptology ePrint Archive 2014 (2014/779), 2014
482014
Faster secure two-party computation in the single-execution setting
X Wang, AJ Malozemoff, J Katz
Annual International Conference on the Theory and Applications of …, 2017
372017
Efficient three-party computation from cut-and-choose
SG Choi, J Katz, AJ Malozemoff, V Zikas
Annual Cryptology Conference, 513-530, 2014
312014
Automated analysis and synthesis of authenticated encryption schemes
VT Hoang, J Katz, AJ Malozemoff
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
282015
5Gen: A framework for prototyping applications using multilinear maps and matrix branching programs
K Lewi, AJ Malozemoff, D Apon, B Carmer, A Foltzer, D Wagner, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
272016
Automated analysis and synthesis of block-cipher modes of operation
AJ Malozemoff, J Katz, MD Green
2014 IEEE 27th Computer Security Foundations Symposium, 140-152, 2014
252014
CompGC: efficient offline/online semi-honest two-party computation.
A Groce, A Ledger, AJ Malozemoff, A Yerukhimovich
IACR Cryptology ePrint Archive 2016 (2016/458), 2016
18*2016
Efficiently enforcing input validity in secure two-party computation
J Katz, AJ Malozemoff, XS Wang
IACR Cryptology ePrint Archive 2016 (2016/184), 2016
152016
Public verifiability in the covert model (almost) for free
V Kolesnikov, AJ Malozemoff
International Conference on the Theory and Application of Cryptology and …, 2015
152015
Attribute-based key exchange with general policies
V Kolesnikov, H Krawczyk, Y Lindell, A Malozemoff, T Rabin
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
132016
5Gen-C: Multi-input functional encryption and program obfuscation for arithmetic circuits
B Carmer, AJ Malozemoff, M Raykova
Proceedings of the 24th ACM SIGSAC Conference on Computer and Communications …, 2017
122017
A standard API for RLWE-based homomorphic encryption
M Brenner, W Dai, S Halevi, K Han, A Jalali, M Kim, K Laine, ...
Technical report, HomomorphicEncryption. org, Redmond WA, 2017
122017
Faster two-party computation secure against malicious adversaries in the single-execution setting
X Wang, AJ Malozemoff, J Katz
Cryptology ePrint Archive, 2016
112016
A unified approach to idealized model separations via indistinguishability obfuscation
MD Green, J Katz, AJ Malozemoff, HS Zhou
International Conference on Security and Cryptography for Networks, 587-603, 2016
102016
Ramparts: A programmer-friendly system for building homomorphic encryption applications
DW Archer, JM Calderón Trilla, J Dagit, A Malozemoff, Y Polyakov, ...
Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied …, 2019
52019
EMP-toolkit: efficient MultiParty computation toolkit (2016)
X Wang, AJ Malozemoff, J Katz
5
Building applications with homomorphic encryption
RA Hallman, K Laine, W Dai, N Gama, AJ Malozemoff, Y Polyakov, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
42018
One-round multi-party communication complexity of distinguishing sums
D Apon, J Katz, AJ Malozemoff
Theoretical Computer Science 501, 101-108, 2013
12013
The system can't perform the operation now. Try again later.
Articles 1–20