Follow
Rio LaVigne
Title
Cited by
Cited by
Year
Public-key cryptography in the fine-grained setting
R LaVigne, A Lincoln, V Vassilevska Williams
Annual International Cryptology Conference, 605-635, 2019
312019
Topology-hiding computation on all graphs
A Akavia, R LaVigne, T Moran
Journal of Cryptology 33 (1), 176-227, 2020
252020
Adversarially Robust Property Preserving Hash Functions
E Boyle, R LaVigne, V Vaikuntanathan
Cryptology ePrint Archive, 2018
162018
Topology-Hiding Computation Beyond Semi-Honest Adversaries
CD Liu Zhang, M Mularczyk, U Maurer, D Tschudi, R LaVigne, T Moran
TCC-Theory of Cryptography Conference, 2018
14*2018
Identity-based encryption with eth residuosity and its incompressibility
D Boneh, R LaVigne, M Sabin
Autumn 2013 TRUST Conference. Washington DC (Oct 9-10, 2013), poster …, 2013
132013
Topology-hiding computation for networks with unknown delays
R LaVigne, CD Liu-Zhang, U Maurer, T Moran, M Mularczyk, D Tschudi
IACR International Conference on Public-Key Cryptography, 215-245, 2020
62020
Simple Homomorphisms of Cocks IBE and Applications.
R LaVigne
IACR Cryptology ePrint Archive 2016, 1150, 2016
52016
Tortoise and Hares Consensus: The Meshcash Framework for Incentive-compatible, Scalable Cryptocurrencies
M Ball, E Boyle, R Cohen, L Kohl, T Malkin, P Meyer, T Moran, T Moran, ...
CSCML 2021 11240, 3-35, 2021
2021
Relationships between functionality, security, and privacy for multiparty computation, hashing, and encryption
RKR LaVigne
Massachusetts Institute of Technology, 2020
2020
Adversarially robust property-preserving hash functions
RKR LaVigne, V Vaikuntanathan
Leibniz Center for Informatics, 2019
2019
1 Last Time-JL Lemma
AM Scribe, R LaVigne, M Staib, D Tsipras
The system can't perform the operation now. Try again later.
Articles 1–11