Oxana Poburinnaya

According to our database1, Oxana Poburinnaya authored at least 15 papers between 2015 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Best of Both Worlds - Revisiting the Spymasters Double Agent Problem.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
COA-Secure Obfuscation and Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Adaptively Secure Computation for RAM Programs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2020
SANNS: Scaling Up Secure Approximate k-Nearest Neighbors Search.
Proceedings of the 29th USENIX Security Symposium, 2020

Towards Multiparty Computation Withstanding Coercion of All Parties.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Fully Deniable Interactive Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Secret-Shared Shuffle.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Studies in incoercible and adaptively secure computation
PhD thesis, 2019

2018
Fully Bideniable Interactive Encryption.
IACR Cryptol. ePrint Arch., 2018

2017
Equivocating Yao: constant-round adaptively secure multiparty computation in the plain model.
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, 2017

Better Two-Round Adaptive Multi-party Computation.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Optimal-Rate Non-Committing Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Optimal-Rate Non-Committing Encryption in a CRS Model.
IACR Cryptol. ePrint Arch., 2016

Better Two-Round Adaptive Multiparty Computation.
IACR Cryptol. ePrint Arch., 2016

2015
Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015


  Loading...