Skypemorph: Protocol obfuscation for tor bridges H Mohajeri Moghaddam, B Li, M Derakhshani, I Goldberg Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 316 | 2012 |
On the security of homomorphic encryption on approximate numbers B Li, D Micciancio Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021 | 205 | 2021 |
Quotient complexity of ideal languages J Brzozowski, G Jirásková, B Li Theoretical Computer Science 470, 36-52, 2013 | 72 | 2013 |
Semi-parallel logistic regression for GWAS on encrypted data M Kim, Y Song, B Li, D Micciancio BMC Medical Genomics 13, 1-13, 2020 | 70 | 2020 |
Securing approximate homomorphic encryption using differential privacy B Li, D Micciancio, M Schultz, J Sorrell Advances in Cryptology–CRYPTO 2022: 42nd Annual International Cryptology …, 2022 | 60 | 2022 |
Homomorphic encryption for finite automata N Genise, C Gentry, S Halevi, B Li, D Micciancio Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019 | 51 | 2019 |
{ACORN}: Input Validation for Secure Aggregation J Bell, A Gascón, T Lepoint, B Li, S Meiklejohn, M Raykova, C Yun 32nd USENIX Security Symposium (USENIX Security 23), 4805-4822, 2023 | 43 | 2023 |
Compactness vs collusion resistance in functional encryption B Li, D Micciancio Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016 | 33 | 2016 |
Syntactic complexity of prefix-, suffix-, bifix-, and factor-free regular languages J Brzozowski, B Li, Y Ye Theoretical Computer Science 449, 37-53, 2012 | 32 | 2012 |
SYNTACTIC COMPLEXITY OF ℛ-AND 𝒥-TRIVIAL REGULAR LANGUAGES J Brzozowski, B Li International Journal of Foundations of Computer Science 25 (07), 807-821, 2014 | 20* | 2014 |
Equational security proofs of oblivious transfer protocols B Li, D Micciancio Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018 | 19 | 2018 |
Syntactic complexities of six classes of star-free languages J Brzozowski, B Li, D Liu Otto-von-Guericke-Universit¨ at Magdeburg, 2012 | 14 | 2012 |
Hintless single-server private information retrieval B Li, D Micciancio, M Raykova, M Schultz-Wu Annual International Cryptology Conference, 183-217, 2024 | 8 | 2024 |
Gadget-based iNTRU lattice trapdoors N Genise, B Li Progress in Cryptology–INDOCRYPT 2020: 21st International Conference on …, 2020 | 8 | 2020 |
Syntactic complexities of some classes of star-free languages J Brzozowski, B Li International Workshop on Descriptional Complexity of Formal Systems, 117-129, 2012 | 8 | 2012 |
Symbolic security of garbled circuits B Li, D Micciancio 2018 IEEE 31st Computer Security Foundations Symposium (CSF), 147-161, 2018 | 6 | 2018 |
Syntactic Complexities of Nine Subclasses of Regular Languages B Li University of Waterloo, 2012 | 3 | 2012 |
Willow: Secure Aggregation with One-Shot Clients J Bell-Clark, A Gascón, B Li, M Raykova, P Schoppmann Cryptology ePrint Archive, 2024 | 2 | 2024 |
Computationally Secure Aggregation and Private Information Retrieval in the Shuffle Model A Gascón, Y Ishai, M Kelkar, B Li, Y Ma, M Raykova Cryptology ePrint Archive, 2024 | 2 | 2024 |
On the complexity of the evaluation of transient extensions of boolean functions J Brzozowski, B Li, Y Ye International Journal of Foundations of Computer Science 23 (01), 21-35, 2012 | 2 | 2012 |