Follow
William Skeith
William Skeith
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
Public key encryption that allows PIR queries
D Boneh, E Kushilevitz, R Ostrovsky, WE Skeith
Advances in Cryptology-CRYPTO 2007: 27th Annual International Cryptology …, 2007
3772007
A survey of single-database private information retrieval: Techniques and applications
R Ostrovsky, WE Skeith III
International Workshop on Public Key Cryptography, 393-411, 2007
3742007
Private searching on streaming data
R Ostrovsky, WE Skeith III
Annual International Cryptology Conference, 223-240, 2005
2242005
Private searching on streaming data
R Ostrovsky, WE Skeith
Journal of Cryptology 20, 397-430, 2007
1162007
Homomorphic secret sharing from paillier encryption
N Fazio, R Gennaro, T Jafarikhah, WE Skeith
Provable Security: 11th International Conference, ProvSec 2017, Xi'an, China …, 2017
542017
Method for private keyword search on streaming data
R Ostrovsky, WE Skeith III
US Patent 8,291,237, 2012
462012
Algebraic lower bounds for computing on encrypted data
R Ostrovsky, WE Skeith III
Cryptology ePrint Archive, 2007
312007
Communication complexity in algebraic two-party protocols
R Ostrovsky, WE Skeith
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
242008
Hard-core predicates for a Diffie-Hellman problem over finite fields
N Fazio, R Gennaro, IM Perera, WE Skeith
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
182013
Generalized learning problems and applications to non-commutative cryptography
G Baumslag, N Fazio, AR Nicolosi, V Shpilrain, WE Skeith
Provable Security: 5th International Conference, ProvSec 2011, Xi’an, China …, 2011
142011
Private Searching on Streaming Data.(Preliminary Version in Proc. of Crypto'05. LNCS 3621, pp. 223-240, 2005.) J
R Ostrovsky, WE Skeith III
Cryptology 20, 4, 0
13
Public-key encryption with efficient amortized updates
N Chandran, R Ostrovsky, WE Skeith III
International Conference on Security and Cryptography for Networks, 17-35, 2010
122010
Hardness of learning problems over burnside groups of exponent 3
N Fazio, K Iga, AR Nicolosi, L Perret, WE Skeith
Designs, Codes and Cryptography 75, 59-70, 2015
82015
On the black-box use of somewhat homomorphic encryption in noninteractive two-party protocols
N Khamsemanan, R Ostrovsky, WE Skeith
SIAM Journal on Discrete Mathematics 30 (1), 266-295, 2016
42016
Publicly evaluatable perceptual hashing
R Gennaro, D Hadaller, T Jafarikhah, Z Liu, WE Skeith, A Timashova
Applied Cryptography and Network Security: 18th International Conference …, 2020
22020
Hardness of learning problems over burnside groups of exponent 3
N Fazio, K Iga, A Nicolosi, L Perret, WE Skeith III
Cryptology ePrint Archive, 2011
22011
Computing joins on encrypted data
WE Skeith III, A Mowshowitz, G Bent
Proceedings of the Annual Conference of the International Technology Alliance, 2011
12011
Homomorphic encryption and non-interactive secure computation
WE Skeith
ProQuest, 2007
12007
Apparatus and method for forming a voice encrypted signal in the hearing range
B Falk, Q Grier, SN Lu, R Ostrovsky, WE Skeith III
US Patent 9,904,789, 2018
2018
Translation-randomizable distributions via random walks
N Khamsemanan, WE Skeith
Provable Security: 7th International Conference, ProvSec 2013, Melaka …, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–20