Follow
Jack Doerner
Jack Doerner
Verified email at ccs.neu.edu - Homepage
Title
Cited by
Cited by
Year
Privacy-preserving distributed linear regression on high-dimensional data
A Gascón, P Schoppmann, B Balle, M Raykova, J Doerner, S Zahur, ...
Cryptology ePrint Archive, 2016
2492016
Scaling ORAM for secure computation
J Doerner, A Shelat
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1892017
Secure two-party threshold ECDSA from ECDSA assumptions
J Doerner, Y Kondi, E Lee, A Shelat
2018 IEEE Symposium on Security and Privacy (SP), 980-997, 2018
1702018
Threshold ECDSA from ECDSA assumptions: The multiparty case
J Doerner, Y Kondi, E Lee, A Shelat
2019 IEEE Symposium on Security and Privacy (SP), 1051-1066, 2019
1422019
Revisiting square-root ORAM: efficient random access in multi-party computation
S Zahur, X Wang, M Raykova, A Gascón, J Doerner, D Evans, J Katz
2016 IEEE Symposium on Security and Privacy (SP), 218-234, 2016
142*2016
Secure linear regression on vertically partitioned datasets.
A Gascón, P Schoppmann, B Balle, M Raykova, J Doerner, S Zahur, ...
IACR Cryptol. ePrint Arch. 2016, 892, 2016
1152016
Secure Stable Matching at Scale
J Doerner, D Evans, A Shelat
642016
Multiparty generation of an RSA modulus
M Chen, J Doerner, Y Kondi, E Lee, S Rosefield, A Shelat, R Cohen
Journal of Cryptology 35 (2), 12, 2022
362022
Threshold bbs+ signatures for distributed anonymous credential issuance
J Doerner, Y Kondi, E Lee, A Shelat, LK Tyner
2023 IEEE Symposium on Security and Privacy (SP), 773-789, 2023
142023
Threshold ECDSA in Three Rounds
J Doerner, Y Kondi, E Lee
Cryptology ePrint Archive, 2023
72023
Guaranteed Output in Rounds for Round-Robin Sampling Protocols
R Cohen, J Doerner, Y Kondi, A Shelat
Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International …, 2022
4*2022
Constant-Round Simulation-Secure Coin Tossing Extension with Guaranteed Output
D Abram, J Doerner, Y Ishai, V Narayanan
Eurocrypt 2024, 2024
2024
Sometimes You Can’t Distribute Random-Oracle-Based Proofs
J Doerner, Y Kondi, LN Rosenbloom
Cryptology ePrint Archive, 2023
2023
Secure Multiparty Computation with Identifiable Abort from Vindicating Release
R Cohen, J Doerner, Y Kondi
Cryptology ePrint Archive, 2023
2023
Three Useful Threshold Cryptography Problems With Efficient Solutions
J Doerner
Northeastern University, 2022
2022
Poster: Secure Gale-Shapley
J Doerner, D Evans, A Shelat
2016
The system can't perform the operation now. Try again later.
Articles 1–16