Public key encryption that allows PIR queries D Boneh, E Kushilevitz, R Ostrovsky, WE Skeith Advances in Cryptology-CRYPTO 2007: 27th Annual International Cryptology …, 2007 | 377 | 2007 |
A survey of single-database private information retrieval: Techniques and applications R Ostrovsky, WE Skeith III International Workshop on Public Key Cryptography, 393-411, 2007 | 374 | 2007 |
Private searching on streaming data R Ostrovsky, WE Skeith III Annual International Cryptology Conference, 223-240, 2005 | 224 | 2005 |
Private searching on streaming data R Ostrovsky, WE Skeith Journal of Cryptology 20, 397-430, 2007 | 116 | 2007 |
Homomorphic secret sharing from paillier encryption N Fazio, R Gennaro, T Jafarikhah, WE Skeith Provable Security: 11th International Conference, ProvSec 2017, Xi'an, China …, 2017 | 54 | 2017 |
Method for private keyword search on streaming data R Ostrovsky, WE Skeith III US Patent 8,291,237, 2012 | 46 | 2012 |
Algebraic lower bounds for computing on encrypted data R Ostrovsky, WE Skeith III Cryptology ePrint Archive, 2007 | 31 | 2007 |
Communication complexity in algebraic two-party protocols R Ostrovsky, WE Skeith Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008 | 24 | 2008 |
Hard-core predicates for a Diffie-Hellman problem over finite fields N Fazio, R Gennaro, IM Perera, WE Skeith Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 18 | 2013 |
Generalized learning problems and applications to non-commutative cryptography G Baumslag, N Fazio, AR Nicolosi, V Shpilrain, WE Skeith Provable Security: 5th International Conference, ProvSec 2011, Xi’an, China …, 2011 | 14 | 2011 |
Private Searching on Streaming Data.(Preliminary Version in Proc. of Crypto'05. LNCS 3621, pp. 223-240, 2005.) J R Ostrovsky, WE Skeith III Cryptology 20, 4, 0 | 13 | |
Public-key encryption with efficient amortized updates N Chandran, R Ostrovsky, WE Skeith III International Conference on Security and Cryptography for Networks, 17-35, 2010 | 12 | 2010 |
Hardness of learning problems over burnside groups of exponent 3 N Fazio, K Iga, AR Nicolosi, L Perret, WE Skeith Designs, Codes and Cryptography 75, 59-70, 2015 | 8 | 2015 |
On the black-box use of somewhat homomorphic encryption in noninteractive two-party protocols N Khamsemanan, R Ostrovsky, WE Skeith SIAM Journal on Discrete Mathematics 30 (1), 266-295, 2016 | 4 | 2016 |
Publicly evaluatable perceptual hashing R Gennaro, D Hadaller, T Jafarikhah, Z Liu, WE Skeith, A Timashova Applied Cryptography and Network Security: 18th International Conference …, 2020 | 2 | 2020 |
Hardness of learning problems over burnside groups of exponent 3 N Fazio, K Iga, A Nicolosi, L Perret, WE Skeith III Cryptology ePrint Archive, 2011 | 2 | 2011 |
Computing joins on encrypted data WE Skeith III, A Mowshowitz, G Bent Proceedings of the Annual Conference of the International Technology Alliance, 2011 | 1 | 2011 |
Homomorphic encryption and non-interactive secure computation WE Skeith ProQuest, 2007 | 1 | 2007 |
Apparatus and method for forming a voice encrypted signal in the hearing range B Falk, Q Grier, SN Lu, R Ostrovsky, WE Skeith III US Patent 9,904,789, 2018 | | 2018 |
Translation-randomizable distributions via random walks N Khamsemanan, WE Skeith Provable Security: 7th International Conference, ProvSec 2013, Melaka …, 2013 | | 2013 |