Scalable private learning with pate N Papernot, S Song, I Mironov, A Raghunathan, K Talwar, Ú Erlingsson arXiv preprint arXiv:1802.08908, 2018 | 752 | 2018 |
Prochlo: Strong privacy for analytics in the crowd A Bittau, Ú Erlingsson, P Maniatis, I Mironov, A Raghunathan, D Lie, ... Proceedings of the 26th symposium on operating systems principles, 441-459, 2017 | 525 | 2017 |
Frodo: Take off the ring! practical, quantum-secure key exchange from LWE J Bos, C Costello, L Ducas, I Mironov, M Naehrig, V Nikolaenko, ... Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 504 | 2016 |
Amplification by shuffling: From local to central differential privacy via anonymity Ú Erlingsson, V Feldman, I Mironov, A Raghunathan, K Talwar, ... Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete …, 2019 | 495 | 2019 |
Key homomorphic PRFs and their applications D Boneh, K Lewi, H Montgomery, A Raghunathan Annual Cryptology Conference, 410-428, 2013 | 408 | 2013 |
Information leakage in embedding models C Song, A Raghunathan Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 253 | 2020 |
Message-locked encryption for lock-dependent messages M Abadi, D Boneh, I Mironov, A Raghunathan, G Segev Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 172 | 2013 |
Protecting accounts from credential stuffing with password breach alerting K Thomas, J Pullman, K Yeo, A Raghunathan, PG Kelley, L Invernizzi, ... 28th USENIX Security Symposium (USENIX Security 19), 1556-1571, 2019 | 164 | 2019 |
Function-private identity-based encryption: Hiding the function in functional encryption D Boneh, A Raghunathan, G Segev Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 148 | 2013 |
Encode, shuffle, analyze privacy revisited: Formalizations and empirical evaluation Ú Erlingsson, V Feldman, I Mironov, A Raghunathan, S Song, K Talwar, ... arXiv preprint arXiv:2001.03618, 2020 | 104 | 2020 |
FrodoKEM M Naehrig, E Alkim, J Bos, L Ducas, K Easterbrook, B LaMacchia, ... National Institute of Standards and Technology (2017), 2017 | 91 | 2017 |
Algebraic pseudorandom functions with improved efficiency from the augmented cascade D Boneh, HW Montgomery, A Raghunathan Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 78 | 2010 |
Function-private subspace-membership encryption and its applications D Boneh, A Raghunathan, G Segev Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 67 | 2013 |
FrodoKEM learning with errors key encapsulation E Alkim, JW Bos, L Ducas, P Longa, I Mironov, M Naehrig, V Nikolaenko, ... NIST PQC standardization: Round 3, 10-20, 2020 | 60 | 2020 |
Deterministic public-key encryption for adaptively chosen plaintext distributions A Raghunathan, G Segev, S Vadhan Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013 | 60 | 2013 |
FrodoKEM learning with errors key encapsulation algorithm specifications and supporting documentation E Alkim, JW Bos, L Ducas, P Longa, I Mironov, M Naehrig, V Nikolaenko, ... NIST submissions, 2019 | 44 | 2019 |
Improved constructions of PRFs secure against related-key attacks K Lewi, H Montgomery, A Raghunathan Applied Cryptography and Network Security: 12th International Conference …, 2014 | 30 | 2014 |
That which we call private Ú Erlingsson, I Mironov, A Raghunathan, S Song arXiv preprint arXiv:1908.03566, 2019 | 24 | 2019 |
Dit: De-identified authenticated telemetry at scale S Huang, S Iyengar, S Jeyaraman, S Kushwah, CK Lee, Z Luo, ... Technical report, Facebook Inc 39, 8562-6, 2021 | 10 | 2021 |
Deterministic public-key encryption for adaptively-chosen plaintext distributions A Raghunathan, G Segev, S Vadhan Journal of Cryptology 31, 1012-1063, 2018 | 8 | 2018 |