Kamu erişimi zorunlu olan makaleler - Lawrence RoyDaha fazla bilgi edinin
Bir yerde sunuluyor: 28
Three halves make a whole? Beating the half-gates lower bound for garbled circuits
M Rosulek, L Roy
Annual International Cryptology Conference, 94-124, 2021
Zorunlu olanlar: US National Science Foundation, US Department of Energy
SoftSpokenOT: Quieter OT extension from small-field silent VOLE in the minicrypt model
L Roy
Annual International Cryptology Conference, 657-687, 2022
Zorunlu olanlar: US Department of Energy
Publicly verifiable zero-knowledge and post-quantum signatures from vole-in-the-head
C Baum, L Braun, CD de Saint Guilhem, M Klooß, E Orsini, L Roy, ...
Annual International Cryptology Conference, 581-615, 2023
Zorunlu olanlar: US Department of Defense, Research Foundation (Flanders), Danish Council for …
Large message homomorphic secret sharing from DCR and applications
L Roy, J Singh
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
Zorunlu olanlar: US Department of Energy
Minimal symmetric PAKE and 1-out-of-N OT from programmable-once public functions
I McQuoid, M Rosulek, L Roy
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Zorunlu olanlar: US National Science Foundation
One tree to rule them all: Optimizing ggm trees and owfs for post-quantum signatures
C Baum, W Beullens, S Mukherjee, E Orsini, S Ramacher, C Rechberger, ...
International Conference on the Theory and Application of Cryptology and …, 2025
Zorunlu olanlar: European Commission
Batching base oblivious transfers
I McQuoid, M Rosulek, L Roy
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
Zorunlu olanlar: US Department of Energy
Robust and fast extraction of 3d symmetric tensor field topology
L Roy, P Kumar, Y Zhang, E Zhang
IEEE transactions on visualization and computer graphics 25 (1), 1102-1111, 2018
Zorunlu olanlar: US National Science Foundation
Mode surfaces of symmetric tensor fields: Topological analysis and seamless extraction
B Qu, L Roy, Y Zhang, E Zhang
IEEE Transactions on Visualization and Computer Graphics 27 (2), 583-592, 2020
Zorunlu olanlar: US National Science Foundation
Succinct homomorphic secret sharing
D Abram, L Roy, P Scholl
Annual International Conference on the Theory and Applications of …, 2024
Zorunlu olanlar: Danish Council for Independent Research
Two-round stateless deterministic two-party Schnorr signatures from pseudorandom correlation functions
Y Kondi, C Orlandi, L Roy
Annual International Cryptology Conference, 646-677, 2023
Zorunlu olanlar: Danish Council for Independent Research, European Commission, Carlsberg …
Multi-scale topological analysis of asymmetric tensor fields on surfaces
F Khan, L Roy, E Zhang, B Qu, SH Hung, H Yeh, RS Laramee, Y Zhang
IEEE transactions on visualization and computer graphics 26 (1), 270-279, 2019
Zorunlu olanlar: US National Science Foundation
Interactive design and visualization of branched covering spaces
L Roy, P Kumar, S Golbabaei, Y Zhang, E Zhang
IEEE Transactions on Visualization and Computer Graphics 24 (1), 843-852, 2017
Zorunlu olanlar: US National Science Foundation
Maximum Number of Transition Points in 3D Linear Symmetry Tensor Fields
Y Zhang, L Roy, R Sharma, E Zhang
Topology-Based Methods in Visualization Conference Pro- ceeding 2017, 2017
Zorunlu olanlar: US National Science Foundation
Rate-1 Arithmetic Garbling From Homomorphic Secret Sharing
P Meyer, C Orlandi, L Roy, P Scholl
Theory of Cryptography Conference, 71-97, 2025
Zorunlu olanlar: European Commission
Under What Conditions Is Encrypted Key Exchange Actually Secure?
J Januzelli, L Roy, J Xu
Cryptology ePrint Archive, 2024
Zorunlu olanlar: US Department of Energy, US Department of Defense, Danish Council for …
Time-Based Cryptography From Weaker Assumptions: Randomness Beacons, Delay Functions and More
D Abram, L Roy, M Simkin
Cryptology ePrint Archive, 2024
Zorunlu olanlar: US Department of Defense, Danish Council for Independent Research
A complete characterization of security for linicrypt block cipher modes
T Hollenberg, M Rosulek, L Roy
2022 IEEE 35th Computer Security Foundations Symposium (CSF), 439-454, 2022
Zorunlu olanlar: US National Science Foundation, US Department of Energy
Improved Reductions from Noisy to Bounded and Probing Leakages via Hockey-Stick Divergences
M Obremski, J Ribeiro, L Roy, FX Standaert, D Venturi
Annual International Cryptology Conference, 461-491, 2024
Zorunlu olanlar: National Fund for Scientific Research, Belgium, Danish Council for …
Practical Privacy-Preserving Authentication for SSH
L Roy, S Lyakhov, Y Jang, M Rosulek
31st USENIX Security Symposium (USENIX Security 22), 3345-3362, 2022
Zorunlu olanlar: US Department of Energy
Yayıncılık ve maddi kaynak bilgileri otomatik olarak bir bilgisayar programı tarafından belirlenmektedir