Sacha Servan-Schreiber

Orcid: 0000-0001-8359-5510

According to our database1, Sacha Servan-Schreiber authored at least 22 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Concretely-Efficient Multi-Key Homomorphic Secret Sharing and Applications.
IACR Cryptol. ePrint Arch., 2025

Non-Interactive Distributed Point Functions.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Multi-Key Homomorphic Secret Sharing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Simultaneous-Message and Succinct Secure Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

2024
FOLEAGE: 픽<sub>4</sub>OLE-Based Multi-Party Computation for Boolean Circuits.
IACR Cryptol. ePrint Arch., 2024

Constrained Pseudorandom Functions for Inner-Product Predicates from Weaker Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

QuietOT: Lightweight Oblivious Transfer with a Public-Key Setup.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

FOLEAGE: $\mathbb {F}_{\scriptstyle 4}$OLE-Based Multi-party Computation for Boolean Circuits.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Private Access Control for Function Secret Sharing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Trellis: Robust and Scalable Metadata-private Anonymous Broadcast.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Private Approximate Nearest Neighbor Search with Sublinear Communication.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Spectrum: High-bandwidth Anonymous Broadcast.
Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation, 2022

Designing Hardware for Cryptography and Cryptography for Hardware.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Lightweight Private Similarity Search.
IACR Cryptol. ePrint Arch., 2021

AdVeil: A Private Targeted-Advertising Ecosystem.
IACR Cryptol. ePrint Arch., 2021

Spectrum: High-Bandwidth Anonymous Broadcast with Malicious Security.
IACR Cryptol. ePrint Arch., 2021

2019
Judge, Jury & Encryptioner: Exceptional Access with a Fixed Social Cost.
CoRR, 2019

Custodes: Auditable Hypothesis Testing.
CoRR, 2019

SchengenDB: A Data Protection Database Proposal.
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2019

2018
Towards Quantifying Uncertainty in Data Analysis & Exploration.
IEEE Data Eng. Bull., 2018

ProSecCo: Progressive Sequence Mining with Convergence Guarantees.
Proceedings of the IEEE International Conference on Data Mining, 2018


  Loading...