Spacemint: A cryptocurrency based on proofs of space S Park, A Kwon, G Fuchsbauer, P Gaži, J Alwen, K Pietrzak Financial Cryptography and Data Security: 22nd International Conference, FC …, 2018 | 235 | 2018 |
Going from bad to worse: from internet voting to blockchain voting S Park, M Specter, N Narula, RL Rivest Journal of Cybersecurity 7 (1), tyaa025, 2021 | 133 | 2021 |
Practical accountability of secret processes J Frankle, S Park, D Shaar, S Goldwasser, D Weitzner 27th USENIX Security Symposium (USENIX Security 18), 657-674, 2018 | 81 | 2018 |
Spacecoin: A cryptocurrency based on proofs of space S Park, K Pietrzak, J Alwen, G Fuchsbauer, P Gazi IACR Cryptology ePrint Archive, 2015 | 49 | 2015 |
Public accountability vs. secret laws: can they coexist? A cryptographic proposal S Goldwasser, S Park Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, 99-110, 2017 | 41 | 2017 |
Fully deniable interactive encryption R Canetti, S Park, O Poburinnaya Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 39 | 2020 |
It wasn’t me! Repudiability and claimability of ring signatures S Park, A Sealfon Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 31 | 2019 |
Is public-key encryption based on LPN practical? I Damgård, S Park IACR Cryptol. ePrint Arch. 2012, 699, 2012 | 31 | 2012 |
Adaptively secure coin-flipping, revisited S Goldwasser, YT Kalai, S Park International Colloquium on Automata, Languages, and Programming, 663-674, 2015 | 28 | 2015 |
Towards secure quadratic voting S Park, RL Rivest Public Choice 172, 151-175, 2017 | 23 | 2017 |
How to subvert backdoored encryption: Security against adversaries that decrypt all ciphertexts T Horel, S Park, S Richelson, V Vaikuntanathan arXiv preprint arXiv:1802.07381, 2018 | 21 | 2018 |
Data structures meet cryptography: 3SUM with preprocessing A Golovnev, S Guo, T Horel, S Park, V Vaikuntanathan Proceedings of the 52nd annual ACM SIGACT symposium on theory of computing …, 2020 | 18 | 2020 |
How practical is public-key encryption based on LPN and ring-LPN? I Damgård, S Park Cryptology ePrint Archive, 2012 | 15 | 2012 |
{KeyForge}:{Non-Attributable} email from {Forward-Forgeable} signatures MA Specter, S Park, M Green 30th USENIX Security Symposium (USENIX Security 21), 1755-1773, 2021 | 14 | 2021 |
How to incentivize data-driven collaboration among competing parties PD Azar, S Goldwasser, S Park Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016 | 13 | 2016 |
3SUM with preprocessing: Algorithms, lower bounds and cryptographic applications A Golovnev, S Guo, T Horel, S Park, V Vaikuntanathan arXiv preprint arXiv:1907.08355, 2019 | 8 | 2019 |
Non-malleable commitments from non-malleable extractors V Goyal, A Kumar, S Park, S Richelson, A Srinivasan Manuscript, accessed via personal communication, 2018 | 8 | 2018 |
Static-memory-hard functions, and modeling the cost of space vs. time T Dryja, QC Liu, S Park Theory of Cryptography: 16th International Conference, TCC 2018, Panaji …, 2018 | 8 | 2018 |
AUDIT: Practical accountability of secret processes J Frankle, S Park, D Shaar, S Goldwasser, DJ Weitzner Cryptology ePrint Archive, 2018 | 5 | 2018 |
Spacecoin: a cryptocurrency based on proofs of space J Alwen, G Fuchsbauer, P Gazi, S Park, K Pietrzak IACR Cryptol. ePrint Arch, 1-26, 2015 | 5 | 2015 |