Sunoo Park
Sunoo Park
Geverifieerd e-mailadres voor csail.mit.edu
Geciteerd door
Geciteerd door
Spacemint: A cryptocurrency based on proofs of space
S Park, A Kwon, G Fuchsbauer, P Gaži, J Alwen, K Pietrzak
International Conference on Financial Cryptography and Data Security, 480-499, 2018
Going from bad to worse: from internet voting to blockchain voting
S Park, M Specter, N Narula, RL Rivest
Journal of Cybersecurity 7 (1), tyaa025, 2021
Practical accountability of secret processes
J Frankle, S Park, D Shaar, S Goldwasser, D Weitzner
27th USENIX Security Symposium (USENIX Security 18), 657-674, 2018
Is public-key encryption based on LPN practical?
I Damgård, S Park
IACR Cryptol. ePrint Arch. 2012, 699, 2012
Adaptively secure coin-flipping, revisited
S Goldwasser, YT Kalai, S Park
International Colloquium on Automata, Languages, and Programming, 663-674, 2015
Fully deniable interactive encryption
R Canetti, S Park, O Poburinnaya
Annual International Cryptology Conference, 807-835, 2020
Public accountability vs. secret laws: can they coexist? A cryptographic proposal
S Goldwasser, S Park
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, 99-110, 2017
Towards secure quadratic voting
S Park, RL Rivest
Public Choice 172 (1), 151-175, 2017
How to incentivize data-driven collaboration among competing parties
PD Azar, S Goldwasser, S Park
Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016
How practical is public-key encryption based on LPN and ring-LPN?
I Damgård, S Park
Cryptology ePrint Archive, 2012
How to subvert backdoored encryption: security against adversaries that decrypt all ciphertexts
T Horel, S Park, S Richelson, V Vaikuntanathan
arXiv preprint arXiv:1802.07381, 2018
It Wasn’t Me!
S Park, A Sealfon
Annual International Cryptology Conference, 159-190, 2019
Data structures meet cryptography: 3SUM with preprocessing
A Golovnev, S Guo, T Horel, S Park, V Vaikuntanathan
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing …, 2020
3SUM with preprocessing: Algorithms, lower bounds and cryptographic applications
A Golovnev, S Guo, T Horel, S Park, V Vaikuntanathan
arXiv preprint arXiv:1907.08355, 2019
Non-malleable commitments from non-malleable extractors
V Goyal, A Kumar, S Park, S Richelson, A Srinivasan
Manuscript, accessed via personal communication, 2018
Static-memory-hard functions, and modeling the cost of space vs. time
T Dryja, QC Liu, S Park
Theory of Cryptography Conference, 33-66, 2018
Spacecoin: a cryptocurrency based on proofs of space
J Alwen, G Fuchsbauer, P Gazi, S Park, K Pietrzak
IACR Cryptol. ePrint Arch, 1-26, 2015
Public Accountability vs. Secret Laws: Can They Coexist?
S Goldwasser, S Park
Cryptology ePrint Archive, 2018
On time and order in multiparty computation
P Azar, S Goldwasser, S Park
Cryptology ePrint Archive. Report 2015/178, 2015
Cryptographically blinded games: leveraging players' limitations for equilibria and profit
P Hubáček, S Park
Proceedings of the fifteenth ACM conference on Economics and computation …, 2014
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20