Antigoni Polychroniadou
Antigoni Polychroniadou
Cryptography Research Lead, JPMorgan AI Research
Verified email at cornell.edu
Title
Cited by
Cited by
Year
The exact round complexity of secure computation
S Garg, P Mukherjee, O Pandey, A Polychroniadou
Annual International Conference on the Theory and Applications of …, 2016
572016
Two-round adaptively secure MPC from indistinguishability obfuscation
S Garg, A Polychroniadou
Theory of Cryptography Conference, 614-637, 2015
472015
Four round secure computation without setup
Z Brakerski, S Halevi, A Polychroniadou
Theory of Cryptography Conference, 645-677, 2017
402017
Laconic oblivious transfer and its applications
C Cho, N Döttling, S Garg, D Gupta, P Miao, A Polychroniadou
Annual International Cryptology Conference, 33-65, 2017
392017
A coding-theoretic approach to recovering noisy RSA keys
KG Paterson, A Polychroniadou, DL Sibborn
International Conference on the Theory and Application of Cryptology and …, 2012
392012
Round-optimal secure multi-party computation
S Halevi, C Hazay, A Polychroniadou, M Venkitasubramaniam
Annual International Cryptology Conference, 488-520, 2018
292018
Composable security in the tamper-proof hardware model under minimal complexity
C Hazay, A Polychroniadou, M Venkitasubramaniam
Theory of Cryptography Conference, 367-399, 2016
26*2016
On the communication required for unconditionally secure multiplication
I Damgård, JB Nielsen, A Polychroniadou, M Raskin
Annual International Cryptology Conference, 459-488, 2016
222016
Efficient multi-party computation: from passive to active security via secure SIMD circuits
D Genkin, Y Ishai, A Polychroniadou
Annual Cryptology Conference, 721-741, 2015
212015
Adaptively secure multi-party computation from LWE (via equivocal FHE)
I Damgård, A Polychroniadou, V Rao
Public-Key Cryptography--PKC 2016, 208-233, 2016
18*2016
Constant round adaptively secure protocols in the tamper-proof hardware model
C Hazay, A Polychroniadou, M Venkitasubramaniam
IACR International Workshop on Public Key Cryptography, 428-460, 2017
122017
More is less: Perfectly secure oblivious algorithms in the multi-server setting
THH Chan, J Katz, K Nayak, A Polychroniadou, E Shi
International Conference on the Theory and Application of Cryptology and …, 2018
92018
Efficient leakage resilient circuit compilers
M Andrychowicz, I Damgård, S Dziembowski, S Faust, A Polychroniadou
Cryptographers’ Track at the RSA Conference, 311-329, 2015
82015
DNS Cache-Based User Tracking.
A Klein, B Pinkas
NDSS, 2019
72019
Two-round adaptively secure multiparty computation from standard assumptions
F Benhamouda, H Lin, A Polychroniadou, M Venkitasubramaniam
Theory of Cryptography Conference, 175-205, 2018
62018
On the communication and round complexity of secure computation
A Polychroniadou
PhD thesis, Aarhus University, 2016
62016
Limits of practical sublinear secure computation
E Boyle, Y Ishai, A Polychroniadou
Annual International Cryptology Conference, 302-332, 2018
52018
Succinct Non-interactive Secure Computation
A Morgan, R Pass, A Polychroniadou
Annual International Conference on the Theory and Applications of …, 2020
12020
Small memory robust simulation of client-server interactive protocols over oblivious noisy channels
THH Chan, Z Liang, A Polychroniadou, E Shi
Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete …, 2020
12020
Privacy-Preserving Dark Pools
G Asharov, T Hybinette Balch, A Polychroniadou, M Veloso
Proceedings of the 19th International Conference on Autonomous Agents and …, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20