Peter Rindal

Orcid: 0000-0003-2402-7411

According to our database1, Peter Rindal authored at least 42 papers between 2016 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Two Party Secret Shared Joins.
IACR Cryptol. ePrint Arch., 2025

Block-Accumulate Codes: Accelerated Linear Codes for PCGs and ZK.
IACR Cryptol. ePrint Arch., 2025

Efficient Permutation Correlations and Batched Random Access for Two-Party Computation.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Stationary Syndrome Decoding for Improved PCGs.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Compact: Approximating Complex Activation Functions for Secure Computation.
Proc. Priv. Enhancing Technol., 2024

Distributional Secure Merge.
IACR Cryptol. ePrint Arch., 2024

Logstar: Efficient Linear* Time Secure Merge.
IACR Cryptol. ePrint Arch., 2024

Improved Multi-Party Fixed-Point Multiplication.
IACR Cryptol. ePrint Arch., 2024

Improved Alternating-Moduli PRFs and Post-quantum Signatures.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Privacy-Preserving Financial Anomaly Detection via Federated Learning & Multi-Party Computation.
Proceedings of the Annual Computer Security Applications Conference, 2024

2023
Privacy-Enhancing Technologies for Financial Data Sharing.
CoRR, 2023

On Black-Box Verifiable Outsourcing.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Oblivious Extractors and Improved Security in Biometric-Based Authentication Systems.
Proceedings of the Computer Security - ESORICS 2023, 2023

Expand-Convolute Codes for Pseudorandom Correlation Generators from LPN.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-Sized Sets.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023

2022
ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

Blazing Fast PSI from Improved OKVS and Subfield VOLE.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Secret-Shared Joins with Multiplicity from Aggregation Trees.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Multi-party Threshold Private Set Intersection with Sublinear Communication.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Silver: Silent VOLE and Oblivious Transfer from Hardness of Decoding Structured LDPC Codes.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Multi-Party Threshold Private Set Intersection with Sublinear Communication.
IACR Cryptol. ePrint Arch., 2020

Fast Database Joins and PSI for Secret Shared Data.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Fast Database Joins for Secret Shared Data.
IACR Cryptol. ePrint Arch., 2019

Cheaper Private Set Intersection via Differentially Private Leakage.
IACR Cryptol. ePrint Arch., 2019

Endemic Oblivious Transfer.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Secure Data Exchange: A Marketplace in the Cloud.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019

Efficient Two-Round OT Extension and Silent Non-Interactive Secure Computation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
ABY3: A Mixed Protocol Framework for Machine Learning.
IACR Cryptol. ePrint Arch., 2018

PIR-PSI: Scaling Private Contact Discovery.
IACR Cryptol. ePrint Arch., 2018

ABY<sup>3</sup>: A Mixed Protocol Framework for Machine Learning.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Labeled PSI from Fully Homomorphic Encryption with Malicious Security.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

DiSE: Distributed Symmetric-key Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
SplitCommit: Implementing and Analyzing Homomorphic UC Commitments.
IACR Cryptol. ePrint Arch., 2017

Private Collaborative Neural Network Learning.
IACR Cryptol. ePrint Arch., 2017

Private Queries on Encrypted Genomic Data.
IACR Cryptol. ePrint Arch., 2017

Improved Private Set Intersection Against Malicious Adversaries.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Malicious-Secure Private Set Intersection via Dual Execution.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Fast Private Set Intersection from Homomorphic Encryption.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Faster Malicious 2-party Secure Computation with Online/Ofine Dual Execution.
IACR Cryptol. ePrint Arch., 2016

Faster Malicious 2-Party Secure Computation with Online/Offline Dual Execution.
Proceedings of the 25th USENIX Security Symposium, 2016


  Loading...