Jelle Vos

Orcid: 0000-0002-3979-9740

According to our database1, Jelle Vos authored at least 17 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Code accompanying the paper titled "Efficient Batchable Secure Outsourced Computation: Depth-Aware Arithmetization of Common Primitives for BFV & BGV".
Dataset, June, 2025

A Hybrid Asymmetric Password-Authenticated Key Exchange in the Random Oracle Model.
IACR Cryptol. ePrint Arch., 2025

Efficient Batchable Secure Outsourced Computation: Depth-Aware Arithmetization of Common Primitives for BFV & BGV.
Proceedings of the 34th USENIX Security Symposium, 2025

2024
Privacy-Preserving Membership Queries for Federated Anomaly Detection.
Proc. Priv. Enhancing Technol., 2024

Depth-Aware Arithmetization of Common Primitives in Prime Fields.
IACR Cryptol. ePrint Arch., 2024

On the Insecurity of Bloom Filter-Based Private Set Intersections.
IACR Cryptol. ePrint Arch., 2024

Oraqle: A Depth-Aware Secure Computation Compiler.
Proceedings of the 12th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2024

SoK: Collusion-resistant Multi-party Private Set Intersections in the Semi-honest Model.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
Differentially-Private Decision Trees with Probabilistic Robustness to Data Poisoning.
CoRR, 2023

Practical Verifiable & Privacy-Preserving Double Auctions.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Practical Multi-Party Private Set Intersection Protocols.
IEEE Trans. Inf. Forensics Secur., 2022

Fast Multi-party Private Set Operations in the Star Topology from Secure ANDs and ORs.
IACR Cryptol. ePrint Arch., 2022

Decentralized Private Freight Declaration & Tracking with Data Validation.
Proceedings of the 2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2022

Efficient Circuits for Permuting and Mapping Packed Values Across Leveled Homomorphic Ciphertexts.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2021

Multi-Party Private Set Intersection Protocols for Practical Applications.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

2018
DEFenD: A Secure and Privacy-Preserving Decentralized System for Freight Declaration.
CoRR, 2018


  Loading...