Refereed conference and journal publications


Yatharth Agarwal, Vishnu Murale, Jason Hennessey, Kyle Hogan, and Mayank Varia. Moving in Next Door: Network Flooding as a Side Channel in Cloud Environments. CANS 2016.

Georgios Kellaris, George Kollios, Kobbi Nissim, and Adam O’Neill. Generic Attacks on Secure Outsourced Databases. CCS 2016.

Ranjit Kumaresan, Vinod Vaikuntanathan, and Prashant Nalini Vasudevan. Improvements to Secure Protocols with Penalties. CCS 2016.

Nikolaj Volgushev, Malte Schwarzkopf, Andrei Lapets, Mayank Varia, and Azer Bestavros. Integrating MPC in Big Data Workflows. CCS 2016 (demo).

Zvika Brakerski and Vinod Vaikuntanathan. Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security. Crypto 2016.

Akshay Degwekar, Vinod Vaikuntanathan, and Prashant Nalini Vasudevan. Fine-Grained Cryptography. Crypto 2016.

Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, and Daniel Wichs. Spooky Encryption and Its Applications. Crypto 2016.

Brett Hemenway, Zahra Jafargholi, Rafail Ostrovsky, Alessandra Scafuro, and Daniel Wichs. Adaptively Secure Garbled Circuits from One-Way Functions. Crypto 2016.

Ranjit Kumaresan, Srinivasan Raghuraman, and Adam Sealfon. Network Oblivious Transfer. Crypto 2016.

Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin, and Adam D. Smith. Reusable Fuzzy Extractors for Low-Entropy Distributions. Eurocrypt 2016.

Pratyay Mukherjee and Daniel Wichs. Two round MPC from LWE via Multi-Key FHE. Eurocrypt 2016.

Huijia Lin and Vinod Vaikuntanathan. Indistinguishability Obfuscation from DDH-Like Assumptions on Constant-Degree Graded Encodings. FOCS 2016.

Da Yu, Luo Mai, Somaya Arianfar, Rodrigo Fonseca, Orran Krieger, and David Oran. Towards a Network Marketplace in a Cloud. HotCloud 2016.

Syed Kamran Haider, Masab Ahmad, Farrukh Hijaz, Astha Patni, Ethan Johnson, Matthew Seita, Omer Khan, and Marten van Dijk. M-MAP: Multi-factor memory authentication for secure embedded processors. ICCD 2015.

Pablo Daniel Azar, Shafi Goldwasser, and Sunoo Park. How to Incentivize Data-Driven Collaboration Among Competing Parties. ITCS 2016.

Nir Bitansky, Shafi Goldwasser, Abhishek Jain, Omer Paneth, Vinod Vaikuntanathan, and Brent Waters. Time-Lock Puzzles from Randomized Encodings. ITCS 2016.

Zvika Brakerski, Vinod Vaikuntanathan, Hoeteck Wee, and Daniel Wichs. Obfuscating Conjunctions under Entropic Ring LWE. ITCS 2016.

Ran Canetti and Justin Holmgren. Fully Succinct Garbled RAM. ITCS 2016.

Hoda Maleki, Mohammad Hadi Valizadeh, William Koch, Azer Bestavros, and Marten van Dijk. Markov Modeling of Moving Target Defense Games. MTD 2016.

Aanchal Malhotra, Isaac E. Cohen, Erik Brakke, and Sharon Goldberg. Attacking the Network Time Protocol. NDSS 2016.

Frank Wang, James Mickens, Nickolai Zeldovich, and Vinod Vaikuntanathan. Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds. NSDI 2016.

Dan Schatzberg, James Cadden, Han Dong, Orran Krieger, and Jonathan Appavoo. EbbRT: A Framework for Building Per-Application Library Operating Systems. OSDI 2016.

Ran Canetti, Daniel Shahaf, and Margarita Vald. Universally Composable Authentication and Key-exchange with Global PKI. PKC 2016.

Adam Sealfon. Shortest Paths and Distances with Differential Privacy. PODS 2016.

Syed Kamran Haider, William Hasenplaugh, and Dan Alistarh. Lease/release: architectural support for scaling contended data structures. PPoPP 2016.

Avichai Cohen, Yossi Gilad, Amir Herzberg, and Michael Schapira. Jumpstarting BGP Security with Path-End Validation. SIGCOMM 2016.

Jason Hennessey, Sahil Tikale, Ata Turk, Emine Kaynar, Chris Hill, Peter Desnoyers, and Orran Krieger. HIL: Designing an Exokernel for the Data Center. SoCC 2016.

Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, and Daniel Wichs. Watermarking cryptographic capabilities. STOC 2016.

Vipul Goyal, Omkant Pandey, and Silas Richelson. Textbook non-malleable commitments. STOC 2016.

Omer Reingold, Guy N. Rothblum, and Ron D. Rothblum. Constant-round interactive proofs for delegating computation. STOC 2016.

Nir Bitansky, Omer Paneth, and Daniel Wichs. Perfect Structure on the Edge of Chaos – Trapdoor Permutations from Indistinguishability Obfuscation. TCC 2016-A.

Nir Bitansky and Vinod Vaikuntanathan. Indistinguishability Obfuscation: From Approximate to Exact. TCC 2016-A.

Andrej Bogdanov, Siyao Guo, Daniel Masny, Silas Richelson, and Alon Rosen. On the Hardness of Learning with Rounding over Small Modulus. TCC 2016-A.

Ran Canetti, Yilei Chen, and Leonid Reyzin. On the Correlation Intractability of Obfuscated Pseudorandom Functions. TCC 2016-A.

Michele Ciampi, Giuseppe Persiano, Alessandra Scafuro, Luisa Siniscalchi, and Ivan Visconti. Improved OR-Composition of Sigma-Protocols. TCC 2016-A.

Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren, Elaine Shi, and Daniel Wichs. Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM. TCC 2016-A.

Shafi Goldwasser and Yael Tauman Kalai. Cryptographic Assumptions: A Position Paper. TCC 2016-A.

Ran Canetti, Yilei Chen, Justin Holmgren, and Mariana Raykova. Succinct Adaptive Garbled RAM. TCC 2016-B.

Victor Costan, Ilia A. Lebedev, and Srinivas Devadas. Sanctum: Minimal Hardware Extensions for Isolated Execution. USENIX Security 2016.


Vinod Vaikuntanathan and Prashant Nalini Vasudevan. Secret Sharing and Statistical Zero Knowledge. Asiacrypt 2015.

Christopher W. Fletcher, Ling Ren, Albert Kwon, Marten van Dijk, and Srinivas Devadas. Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM. ASPLOS 2015.

Christine Bassem and Azer Bestavros. Network-Constrained Packing of Brokered Workloads in Virtualized Environments. CCGrid 2015.

Xianrui Meng, Seny Kamara, Kobbi Nissim, and George Kollios. GRECS: Graph Encryption for Approximate Shortest Distance Queries. CCS 2015.

Prabhanjan Ananth, Zvika Brakerski, Gil Segev, and Vinod Vaikuntanathan. From Selective to Adaptive Security in Functional Encryption. Crypto 2015.

Ran Canetti, Asaf Cohen, and Yehuda Lindell. A Simpler Variant of Universally Composable Security for Standard Multiparty Computation. Crypto 2015.

Ran Canetti, Vipul Goyal, and Abhishek Jain. Concurrent Secure Computation with Optimal Query Complexity. Crypto 2015.

Sergey Gorbunov, Vinod Vaikuntanathan, and Hoeteck Wee. Predicate Encryption for Circuits from LWE. Crypto 2015.

Christopher W. Fletcher, Ling Ren, Albert Kwon, Marten Van Dijk, Emil Stefanov, Dimitrios Serpanos, and Srinivas Devadas. A Low-Latency, Low-Area Hardware Oblivious RAM Controller. FCCM 2015.

Nikolaj Volgushev, Andrei Lapets, and Azer Bestavros. Programming Support for an Integrated Multi-Party Computation and MapReduce Infrastructure. HotWeb 2015.

Shafi Goldwasser, Yael Tauman Kalai, and Sunoo Park. Adaptively Secure Coin-Flipping, Revisited. ICALP 2015.

Mario Meireles Teixeira and Azer Bestavros. End-to-end informed VM selection in compute clouds. ICC 2015.

Peter Desnoyers, Jason Hennessey, Brent Holden, Orran Krieger, Larry Rudolph, and Adam Young. Using Open Stack for an Open Cloud Exchange (OCX). IC2E 2015.

Xiangyao Yu, Syed Kamran Haider, Ling Ren, Christopher W. Fletcher, Albert Kwon, Marten van Dijk, and Srinivas Devadas. PrORAM: Dynamic Prefetcher for Oblivious RAM. ISCA 2015.

Nishanth Chandran, Wutichai Chongchitmate, Juan A. Garay, Shafi Goldwasser, Rafail Ostrovsky, and Vassilis Zikas. The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults. ITCS 2015.

Pavel Hubacek and Daniel Wichs. On the Communication Complexity of Secure Function Evaluation with Long Output. ITCS 2015.

Charalampos Mavroforakis, Nathan Chenette, Adam O’Neill, George Kollios, and Ran Canetti. Modular Order-Preserving Encryption, Revisited. SIGMOD 2015.

Jelle van den Hooff, David Lazar, Matei Zaharia, and Nickolai Zeldovich. Vuvuzela: Scalable Private Messaging Resistant to Traffic Analysis. SOSP 2015.

Ran Canetti, Justin Holmgren, Abhishek Jain, and Vinod Vaikuntanathan. Succinct Garbling and Indistinguishability Obfuscation of RAM Programs. STOC 2015.

Sergey Gorbunov, Vinod Vaikuntanathan, and Daniel Wichs. Leveled Fully Homomorphic Signatures from Standard Lattices. STOC 2015.

Zvika Brakerski and Vinod Vaikuntanathan. Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions Or: How to Secretly Embed a Circuit in Your PRF. TCC 2015.

Ran Canetti, Shafi Goldwasser, and Oxana Poburinnaya. Adaptively Secure Two-party Computation From Indistinguishability Obfuscation. TCC 2015.

Ran Canetti, Yael Tauman Kalai, and Omer Paneth. On Obfuscation with Random Oracles. TCC 2015.

Ran Canetti, Huijia Lin, Stefano Tessaro, and Vinod Vaikuntanathan. Obfuscation of Probabilistic Circuits and Applications. TCC 2015.

Aloni Cohen, Shafi Goldwasser, and Vinod Vaikuntanathan. Aggregate Pseudorandom Functions and Connections to Learning. TCC 2015.

Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, and Srinivas Devadas. Constants Count: Practical Improvements to Oblivious RAM. USENIX Security 2015.

Christine Bassem and Azer Bestavros. Rational coordination of crowdsourced resources for geo-temporal request satisfaction. WoWMoM 2015.


Nir Bitansky and Ran Canetti. On Strong Simulation and Composable Point Obfuscation. Journal of Cryptology.

Ran Canetti, Abhishek Jain, and Alessandra Scafuro. Practical UC security with a Global Random Oracle. CCS 2014.

Frans Kaashoek, Jelle van den Hooff, and Nickolai Zeldovich. VerSum: Verifiable Computations over Large Public Logs. CCS 2014.

Nir Bitansky, Ran Canetti, Henry Cohn, Shafi Goldwasser, Yael Tauman Kalai, Omer Paneth, and Alon Rosen. The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator. Crypto 2014.

Craig Gentry, Shai Halevi, Mariana Raykova, and Daniel Wichs. Outsourcing Private RAM Computation. FOCS 2014.

Richard Skowyra, Andrei Lapets, Azer Bestavros, and Assaf J. Kfoury. A Verification Platform for SDN-Enabled Applications. IC2E 2014.

Ran Canetti, Omer Paneth, Dimitrios Papadopoulos, and Nikos Triandopoulos. Verifiable Set Operations over Outsourced Databases. PKC 2014.

Ran Canetti, Vladimir Kolesnikov, Charles Rackoff, and Yevgeniy Vahlis. Secure Key Exchange and Sessions without Credentials. SCN 2014.

Book chapters and magazine articles

Ariel Hamlin, Nabil Schear, Emily Shen, Mayank Varia, Sophia Yakoubov, and Arkady Yerukhimovich. Cryptography for Big Data Security. Book chapter in “Big Data: Storage, Sharing, and Security,” May 2016.

Aanchal Malhotra and Sharon Goldberg. Attacking NTP’s Authenticated Broadcast Mode. ACM SIGCOMM Computer Communication Review, April 2016.

Raluca Ada Popa and Nickolai Zeldovich. How to Compute With Data You Can’t See. IEEE Spectrum, August 2015.


Nirvan Tyagi and Yossi Gilad and Matei Zaharia and Nickolai Zeldovich. Stadium: A Distributed Metadata-Private Messaging System. Cryptology ePrint Archive.

Christine Bassem and Azer Bestavros. Incentive-Compatible Route Coordination of Crowdsourced Resources. BUCS Technical Report Archives.

Christine Bassem and Azer Bestavros. Scheduling of Data-Intensive Workloads in a Brokered Virtualized Environment. BUCS Technical Report Archives.

Nir Bitansky, Ran Canetti, Alessandro Chiesa, Shafi Goldwasser, Huijia Lin, Aviad Rubinstein, and Eran Tromer. The Hunting of the SNARK. Cryptology ePrint Archive.

Nir Bitansky, Akshay Degwekar, and Vinod Vaikuntanathan. Structure vs Hardness through the Obfuscation Lens. Cryptology ePrint Archive.

Nir Bitansky, Ryo Nishimaki, Alain Passelegue, and Daniel Wichs. From Cryptomania to Obfustopia through Secret-Key Functional Encryption. Cryptology ePrint Archive.

Zvika Brakerski, Justin Holmgren, and Yael Tauman Kalai. Non-Interactive RAM and Batch NP Delegation from any PIR. Cryptology ePrint Archive and Electronic Colloquium on Computational Complexity.

Ran Canetti, Justin Holmgren, Abhishek Jain, and Vinod Vaikuntanathan. Indistinguishability Obfuscation of Iterated Circuits and RAM Programs. Cryptology ePrint Archive.

Aloni Cohen, Justin Holmgren, and Vinod Vaikuntanathan. Publicly Verifiable Software Watermarking. Cryptology ePrint Archive.

Aloni Cohen and Saleet Klein. The GGM PRF is a Weakly One-Way Family of Functions. Cryptology ePrint Archive.

Victor Costan and Srinivas Devadas. Intel SGX Explained. Cryptology ePrint Archive.

Ivan Damgard and Sunoo Park. Towards Optimally Efficient Secret-Key Authentication from PRG. Cryptology ePrint Archive.

Sharon Goldberg and Harlan Stenn. draft-stenn-ntp-not-you-refid: Network Time Protocol Not You REFID. IETF Internet Draft.

Zahra Jafargholi and Daniel Wichs. Adaptive Security of Yao’s Garbled Circuits. Cryptology ePrint Archive.

Yael Tauman Kalai and Omer Paneth. Delegating RAM Computations. Cryptology ePrint Archive.

Yael Tauman Kalai, Guy N. Rothblum, and Ron D. Rothblum. From Obfuscation to the Security of Fiat-Shamir for Proofs. Cryptology ePrint Archive.

William Koch and Azer Bestavros. PROVIDE: Hiding from Automated Network Scans with Proofs of Identity. BUCS Technical Report Archives.

Andrei Lapets, Eric Dunton, Kyle Holzinger, Frederick Jansen, and Azer Bestavros. Web-based Multi-Party Computation with Application to Anonymous Aggregate Compensation Analytics. BUCS Technical Report Archives.

Aanchal Malhotra and Sharon Goldberg. draft-aanchal4-ntp-mac: Message Authentication Codes for the Network Time Protocol. IETF Internet Draft.

Xianrui Meng, Haohan Zhu, and George Kollios. Secure Top-k Query Processing on Encrypted Databases. arXiv.

Ryo Nishimaki and Daniel Wichs. Watermarking Cryptographic Programs Against Arbitrary Removal Strategies. Cryptology ePrint Archive.

Sunoo Park, Krzysztof Pietrzak, Albert Kwon, Joel Alwen, Georg Fuchsbauer, and Peter Gazi. Spacemint: A Cryptocurrency Based on Proofs of Space. Cryptology ePrint Archive.

Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, and Srinivas Devadas. Ring ORAM: Closing the Gap Between Small and Large Client Storage Oblivious RAM. Cryptology ePrint Archive.

Nikolaj Volgushev, Andrei Lapets, and Azer Bestavros. Programming Support for an Integrated Multi-Party Computation and MapReduce Infrastructure. BUCS Technical Report Archives.

Nikolaj Volgushev, Andrei Lapets, and Azer Bestavros. Scather: Programming with Multi-party Computation and MapReduce. BUCS Technical Report Archives.