Kevin Lewi

According to our database1, Kevin Lewi authored at least 29 papers between 2012 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
The OPAQUE Augmented Password-Authenticated Key Exchange (aPAKE) Protocol.
RFC, July, 2025

2024
WhisPIR: Stateless Private Information Retrieval with Low Communication.
IACR Cryptol. ePrint Arch., 2024

2023
Parakeet: Practical Key Transparency for End-to-End Encrypted Messaging.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

STROBE: Streaming Threshold Random Beacons.
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023

2022
Oblivious Revocable Functions and Encrypted Indexing.
IACR Cryptol. ePrint Arch., 2022

Aggregating and Thresholdizing Hash-based Signatures using STARKs.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Aggregating hash-based signatures using STARKs.
IACR Cryptol. ePrint Arch., 2021

HashWires: Hyperefficient Credential-Based Range Proofs.
IACR Cryptol. ePrint Arch., 2021

STROBE: Stake-based Threshold Random Beacons.
IACR Cryptol. ePrint Arch., 2021

2020
Single-Message Credential-Hiding Login.
IACR Cryptol. ePrint Arch., 2020

Distributed Auditing Proofs of Liabilities.
IACR Cryptol. ePrint Arch., 2020

2019
Securing Update Propagation with Homomorphic Hashing.
IACR Cryptol. ePrint Arch., 2019

2018
Scaling Backend Authentication at Facebook.
IACR Cryptol. ePrint Arch., 2018

Function-Hiding Inner Product Encryption Is Practical.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

2017
Constraining Pseudorandom Functions Privately.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

2016
Advanced applications of multilinear maps in cryptography.
PhD thesis, 2016

Practical Order-Revealing Encryption with Limited Leakage.
Proceedings of the Fast Software Encryption - 23rd International Conference, 2016

Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
Losing Weight by Gaining Edges.
Proceedings of the Algorithms - ESA 2014, 2014

Improved Constructions of PRFs Secure Against Related-Key Attacks.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
On the parameterized complexity of k-SUM.
CoRR, 2013

Exact Weight Subgraphs and the k-Sum Conjecture.
Proceedings of the Automata, Languages, and Programming - 40th International Colloquium, 2013

Key Homomorphic PRFs and Their Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Iterating Inverse Binary Transducers.
J. Autom. Lang. Comb., 2012

The Online Metric Matching Problem for Doubling Metrics.
Proceedings of the Automata, Languages, and Programming - 39th International Colloquium, 2012

Preventing Unraveling in Social Networks: The Anchored k-Core Problem.
Proceedings of the Automata, Languages, and Programming - 39th International Colloquium, 2012

Iterating Invertible Binary Transducers.
Proceedings of the Descriptional Complexity of Formal Systems, 2012


  Loading...