default search action
Brett Hemenway
Person information
- affiliation: University of Pennsylvania, Department of Computer and Information Science, Philadelphia, PA, USA
- affiliation (2010 - 2013): University of Michigan, Department of Mathematics, Ann Arbor, MI, USA
- affiliation (PhD 2010): University of California Los Angeles, Department of Mathematics, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i35]Daniel Noble, Brett Hemenway, Rafail Ostrovsky:
MetaDORAM: Breaking the Log-Overhead Information Theoretic Barrier. Electron. Colloquium Comput. Complex. TR24 (2024) - [i34]Daniel Noble, Brett Hemenway Falk, Rafail Ostrovsky:
MetaDORAM: Breaking the Log-Overhead Information Theoretic Barrier. IACR Cryptol. ePrint Arch. 2024: 11 (2024) - [i33]Brett Hemenway Falk, Pratyush Mishra, Matan Shtepel:
Malicious Security for PIR (almost) for Free. IACR Cryptol. ePrint Arch. 2024: 964 (2024) - 2023
- [j11]Brett Hemenway Falk, Rohit Nema, Rafail Ostrovsky:
Linear-time 2-party secure merge from additively homomorphic encryption. J. Comput. Syst. Sci. 137: 37-49 (2023) - [j10]Marcella Hastings, Brett Hemenway Falk, Gerry Tsoukalas:
Privacy-Preserving Network Analytics. Manag. Sci. 69(9): 5482-5500 (2023) - [j9]Alon Benhaim, Brett Hemenway Falk, Gerry Tsoukalas:
Scaling Blockchains: Can Committee-Based Consensus Help? Manag. Sci. 69(11): 6525-6539 (2023) - [c29]Brett Hemenway Falk, Daniel Noble, Tal Rabin:
Proactive Secret Sharing with Constant Communication. TCC (2) 2023: 337-373 - [c28]Brett Hemenway, Daniel Noble, Rafail Ostrovsky, Matan Shtepel, Jacob Zhang:
DORAM Revisited: Maliciously Secure RAM-MPC with Logarithmic Overhead. TCC (1) 2023: 441-470 - [c27]Brett Hemenway Falk, Rafail Ostrovsky, Matan Shtepel, Jacob Zhang:
GigaDORAM: Breaking the Billion Address Barrier. USENIX Security Symposium 2023: 3871-3888 - [i32]Brett Hemenway Falk, Gerry Tsoukalas, Niuniu Zhang:
Crypto Wash Trading: Direct vs. Indirect Estimation. CoRR abs/2311.18717 (2023) - [i31]Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky, Matan Shtepel, Jacob Zhang:
DORAM revisited: Maliciously secure RAM-MPC with logarithmic overhead. IACR Cryptol. ePrint Arch. 2023: 578 (2023) - [i30]Brett Hemenway Falk, Daniel Noble, Tal Rabin:
Proactive Secret Sharing with Constant Communication. IACR Cryptol. ePrint Arch. 2023: 942 (2023) - [i29]Brett Hemenway Falk, Rafail Ostrovsky, Matan Shtepel, Jacob Zhang:
GigaDORAM: Breaking the Billion Address Barrier. IACR Cryptol. ePrint Arch. 2023: 1950 (2023) - 2022
- [c26]Brett Hemenway Falk, Rohit Nema, Rafail Ostrovsky:
A Linear-Time 2-Party Secure Merge Protocol. CSCML 2022: 408-427 - [c25]Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky:
3-Party Distributed ORAM from Oblivious Set Membership. SCN 2022: 437-461 - [i28]Brett Hemenway Falk, Gerry Tsoukalas, Niuniu Zhang:
Economics of NFTs: The Value of Creator Royalties. CoRR abs/2212.00292 (2022) - [i27]Brett Hemenway Falk, Rohit Nema, Rafail Ostrovsky:
A Linear-Time 2-Party Secure Merge Protocol. IACR Cryptol. ePrint Arch. 2022: 380 (2022) - 2021
- [c24]Brett Hemenway Falk, Rafail Ostrovsky:
Secure Merge with O(n log log n) Secure Operations. ITC 2021: 7:1-7:29 - [c23]Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky:
Alibi: A Flaw in Cuckoo-Hashing Based Hierarchical ORAM Schemes and a Solution. EUROCRYPT (3) 2021: 338-369 - [i26]Alon Benhaim, Brett Hemenway Falk, Gerry Tsoukalas:
Scaling Blockchains: Can Elected Committees Help? CoRR abs/2110.08673 (2021) - [i25]Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky:
3-Party Distributed ORAM from Oblivious Set Membership. IACR Cryptol. ePrint Arch. 2021: 1463 (2021) - 2020
- [j8]Brett Hemenway Falk, Nadia Heninger, Michael Rudow:
Properties of constacyclic codes under the Schur product. Des. Codes Cryptogr. 88(6): 993-1021 (2020) - [j7]Gerry Tsoukalas, Brett Hemenway Falk:
Token-Weighted Crowdsourcing. Manag. Sci. 66(9): 3843-3859 (2020) - [j6]Brett Hemenway, Noga Ron-Zewi, Mary Wootters:
Local List Recovery of High-Rate Tensor Codes and Applications. SIAM J. Comput. 49(4) (2020) - [i24]Brett Hemenway Falk, Rafail Ostrovsky:
Secure merge with O(n log log n) secure operation. IACR Cryptol. ePrint Arch. 2020: 807 (2020) - [i23]Brett Hemenway Falk, Daniel Noble:
Secure Computation over Lattices and Elliptic Curves. IACR Cryptol. ePrint Arch. 2020: 926 (2020) - [i22]Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky:
Alibi: A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution. IACR Cryptol. ePrint Arch. 2020: 997 (2020)
2010 – 2019
- 2019
- [c22]Edo Roth, Daniel Noble, Brett Hemenway Falk, Andreas Haeberlen:
Honeycrisp: large-scale differentially private aggregation without a trusted core. SOSP 2019: 196-210 - [c21]Marcella Hastings, Brett Hemenway, Daniel Noble, Steve Zdancewic:
SoK: General Purpose Compilers for Secure Multi-Party Computation. IEEE Symposium on Security and Privacy 2019: 1220-1237 - [c20]Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky:
Private Set Intersection with Linear Communication from General Assumptions. WPES@CCS 2019: 14-25 - [c19]Brett Hemenway Falk, Steve Lu, Rafail Ostrovsky:
DURASIFT: A Robust, Decentralized, Encrypted Database Supporting Private Searches with Complex Policy Controls. WPES@CCS 2019: 26-36 - 2018
- [j5]Brett Hemenway, Rafail Ostrovsky:
Efficient robust secret sharing from expander graphs. Cryptogr. Commun. 10(1): 79-99 (2018) - [j4]George Alter, Brett Hemenway Falk, Steve Lu, Rafail Ostrovsky:
Computing Statistics from Private Data. Data Sci. J. 17: 31 (2018) - [j3]Brett Hemenway, Mary Wootters:
Linear-time list recovery of high-rate expander codes. Inf. Comput. 261: 202-218 (2018) - [c18]Quinn Grier, Brett Hemenway Falk, Steve Lu, Rafail Ostrovsky:
ETERNAL: Encrypted Transmission With an Error-correcting, Real-time, Noise-resilient Apparatus on Lightweight Devices. MPS@CCS 2018: 61-70 - [i21]Brett Hemenway Falk, Nadia Heninger, Michael Rudow:
Properties of Constacyclic Codes Under the Schur Product. CoRR abs/1810.07630 (2018) - [i20]Brett Hemenway Falk, Daniel Noble, Rafail Ostrovsky:
Private Set Intersection with Linear Communication from General Assumptions. IACR Cryptol. ePrint Arch. 2018: 238 (2018) - 2017
- [c17]Brett Hemenway, Noga Ron-Zewi, Mary Wootters:
Local List Recovery of High-Rate Tensor Codes & Applications. FOCS 2017: 204-215 - [i19]Brett Hemenway, Noga Ron-Zewi, Mary Wootters:
Local List Recovery of High-rate Tensor Codes and Applications. CoRR abs/1706.03383 (2017) - [i18]Brett Hemenway, Noga Ron-Zewi, Mary Wootters:
Local List Recovery of High-rate Tensor Codes & Applications. Electron. Colloquium Comput. Complex. TR17 (2017) - 2016
- [j2]Brett Hemenway, Sanjeev Khanna:
Sensitivity and computational complexity in financial networks. Algorithmic Finance 5(3-4): 95-110 (2016) - [c16]Ted Chinburg, Brett Hemenway, Nadia Heninger, Zachary Scherr:
Cryptographic Applications of Capacity Theory: On the Optimality of Coppersmith's Method for Univariate Polynomials. ASIACRYPT (1) 2016: 759-788 - [c15]Brett Hemenway, Zahra Jafargholi, Rafail Ostrovsky, Alessandra Scafuro, Daniel Wichs:
Adaptively Secure Garbled Circuits from One-Way Functions. CRYPTO (3) 2016: 149-178 - [c14]Brett Hemenway, Steve Lu, Rafail Ostrovsky, William Welser IV:
High-Precision Secure Computation of Satellite Collision Probabilities. SCN 2016: 169-187 - [c13]Brett Hemenway, Rafail Ostrovsky, Silas Richelson, Alon Rosen:
Adaptive Security with Quasi-Optimal Rate. TCC (A1) 2016: 525-541 - [i17]Ted Chinburg, Brett Hemenway, Nadia Heninger, Zachary Scherr:
Cryptographic applications of capacity theory: On the optimality of Coppersmith's method for univariate polynomials. CoRR abs/1605.08065 (2016) - [i16]Brett Hemenway, Steve Lu, Rafail Ostrovsky, William Welser IV:
High-precision Secure Computation of Satellite Collision Probabilities. IACR Cryptol. ePrint Arch. 2016: 319 (2016) - [i15]Brett Hemenway, Rafail Ostrovsky:
Efficient Robust Secret Sharing from Expander Graphs. IACR Cryptol. ePrint Arch. 2016: 735 (2016) - [i14]Ted Chinburg, Brett Hemenway, Nadia Heninger, Zachary Scherr:
Cryptographic applications of capacity theory: On the optimality of Coppersmith's method for univariate polynomials. IACR Cryptol. ePrint Arch. 2016: 869 (2016) - 2015
- [j1]Brett Hemenway, Rafail Ostrovsky, Mary Wootters:
Local correctability of expander codes. Inf. Comput. 243: 178-190 (2015) - [c12]Brett Hemenway, Mary Wootters:
Linear-Time List Recovery of High-Rate Expander Codes. ICALP (1) 2015: 701-712 - [c11]Brett Hemenway, Rafail Ostrovsky, Alon Rosen:
Non-committing Encryption from Φ-hiding. TCC (1) 2015: 591-608 - [i13]Brett Hemenway, Mary Wootters:
Linear-time list recovery of high-rate expander codes. CoRR abs/1503.01955 (2015) - [i12]Brett Hemenway, Rafail Ostrovsky, Alon Rosen:
Non-committing encryption from Φ-hiding. IACR Cryptol. ePrint Arch. 2015: 54 (2015) - [i11]Brett Hemenway, Rafail Ostrovsky:
Building Lossy Trapdoor Functions from Lossy Encryption. IACR Cryptol. ePrint Arch. 2015: 156 (2015) - [i10]Brett Hemenway, Zahra Jafargholi, Rafail Ostrovsky, Alessandra Scafuro, Daniel Wichs:
Adaptively Secure Garbled Circuits from One-Way Functions. IACR Cryptol. ePrint Arch. 2015: 1250 (2015) - 2013
- [c10]Brett Hemenway, Rafail Ostrovsky:
Building Lossy Trapdoor Functions from Lossy Encryption. ASIACRYPT (2) 2013: 241-260 - [c9]Brett Hemenway, Rafail Ostrovsky, Mary Wootters:
Local Correctability of Expander Codes. ICALP (1) 2013: 540-551 - [i9]Brett Hemenway, Rafail Ostrovsky, Mary Wootters:
Local Correctability of Expander Codes. CoRR abs/1304.8129 (2013) - 2012
- [c8]Anna C. Gilbert, Brett Hemenway, Atri Rudra, Martin J. Strauss, Mary Wootters:
Recovering simple signals. ITA 2012: 382-391 - [c7]Brett Hemenway, Rafail Ostrovsky:
On Homomorphic Encryption and Chosen-Ciphertext Security. Public Key Cryptography 2012: 52-65 - [c6]Brett Hemenway, Steve Lu, Rafail Ostrovsky:
Correlated Product Security from Any One-Way Function. Public Key Cryptography 2012: 558-575 - [c5]Brett Hemenway, Rafail Ostrovsky:
Extended-DDH and Lossy Trapdoor Functions. Public Key Cryptography 2012: 627-643 - [c4]Anna C. Gilbert, Brett Hemenway, Martin J. Strauss, David P. Woodruff, Mary Wootters:
Reusable low-error compressive sampling schemes through privacy. SSP 2012: 536-539 - 2011
- [c3]Brett Hemenway, Rafail Ostrovsky, Martin J. Strauss, Mary Wootters:
Public Key Locally Decodable Codes with Short Keys. APPROX-RANDOM 2011: 605-615 - [c2]Brett Hemenway, Benoît Libert, Rafail Ostrovsky, Damien Vergnaud:
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security. ASIACRYPT 2011: 70-88 - [i8]Brett Hemenway, Rafail Ostrovsky, Martin Strauss, Mary Wootters:
Public Key Locally Decodable Codes with Short Keys. Electron. Colloquium Comput. Complex. TR11 (2011) - 2010
- [i7]Brett Hemenway, Rafail Ostrovsky:
Building Injective Trapdoor Functions From Oblivious Transfer. Electron. Colloquium Comput. Complex. TR10 (2010) - [i6]Brett Hemenway, Rafail Ostrovsky:
Homomorphic Encryption Over Cyclic Groups Implies Chosen-Ciphertext Security. IACR Cryptol. ePrint Arch. 2010: 99 (2010) - [i5]Brett Hemenway, Steve Lu, Rafail Ostrovsky:
Correlated Product Security From Any One-Way Function and the New Notion of Decisional Correlated Product Security. IACR Cryptol. ePrint Arch. 2010: 100 (2010)
2000 – 2009
- 2009
- [i4]Brett Hemenway, Rafail Ostrovsky:
Lossy Trapdoor Functions from Smooth Homomorphic Hash Proof Systems. Electron. Colloquium Comput. Complex. TR09 (2009) - [i3]Brett Hemenway, Benoît Libert, Rafail Ostrovsky, Damien Vergnaud:
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security. IACR Cryptol. ePrint Arch. 2009: 88 (2009) - 2008
- [c1]Brett Hemenway, Rafail Ostrovsky:
Public-Key Locally-Decodable Codes. CRYPTO 2008: 126-143 - 2007
- [i2]Brett Hemenway, Rafail Ostrovsky:
Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code. Electron. Colloquium Comput. Complex. TR07 (2007) - [i1]Brett Hemenway, Rafail Ostrovsky:
Public Key Encryption Which is Simultaneously a Locally-Decodable Error-Correcting Code. IACR Cryptol. ePrint Arch. 2007: 83 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-10 00:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint