default search action
Alex Davidson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c11]Martin R. Albrecht, Alex Davidson, Amit Deo, Daniel Gardham:
Crypto Dark Matter on the Torus - Oblivious PRFs from Shallow PRFs and TFHE. EUROCRYPT (6) 2024: 447-476 - [i19]Sofía Celi, Alex Davidson:
Call Me By My Name: Simple, Practical Private Information Retrieval for Keyword Queries. IACR Cryptol. ePrint Arch. 2024: 92 (2024) - [i18]Alex Davidson, Jana Iyengar, Christopher A. Wood:
The Privacy Pass Architecture. RFC 9576: 1-25 (2024) - [i17]Sofía Celi, Alex Davidson, Steven Valdez, Christopher A. Wood:
Privacy Pass Issuance Protocols. RFC 9578: 1-36 (2024) - 2023
- [j2]Alex Davidson, Gonçalo Pestana, Sofía Celi:
FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval. Proc. Priv. Enhancing Technol. 2023(1): 365-383 (2023) - [i16]Martin R. Albrecht, Alex Davidson, Amit Deo, Daniel Gardham:
Crypto Dark Matter on the Torus: Oblivious PRFs from shallow PRFs and FHE. IACR Cryptol. ePrint Arch. 2023: 232 (2023) - [i15]Sofía Celi, Alex Davidson, Hamed Haddadi, Gonçalo Pestana, Joe Rowell:
DiStefano: Decentralized Infrastructure for Sharing Trusted Encrypted Facts and Nothing More. IACR Cryptol. ePrint Arch. 2023: 1063 (2023) - [i14]Alex Davidson, Armando Faz-Hernández, Nick Sullivan, Christopher A. Wood:
Oblivious Pseudorandom Functions (OPRFs) Using Prime-Order Groups. RFC 9497: 1-61 (2023) - 2022
- [c10]Alex Davidson, Peter Snyder, E. B. Quirk, Joseph Genereux, Benjamin Livshits, Hamed Haddadi:
STAR: Secret Sharing for Private Threshold Aggregation Reporting. CCS 2022: 697-710 - [c9]Alex Davidson, Matthias Frei, Martin Gartner, Hamed Haddadi, Adrian Perrig, Jordi Subirà Nieto, Philipp Winter, François Wirz:
Tango or square dance?: how tightly should we integrate network functionality in browsers? HotNets 2022: 205-212 - [c8]Tara Whalen, Thibault Meunier, Mrudula Kodali, Alex Davidson, Marwan Fayed, Armando Faz-Hernández, Watson Ladd, Deepak Maram, Nick Sullivan, Benedikt Wolters, Maxime Guerreiro, Andrew Galloni:
Let The Right One In: Attestation as a Usable CAPTCHA Alternative. SOUPS @ USENIX Security Symposium 2022: 599-612 - [i13]Philipp Winter, Ralph Giles, Alex Davidson, Gonçalo Pestana:
A Framework for Building Secure, Scalable, Networked Enclaves. CoRR abs/2206.04123 (2022) - [i12]Alex Davidson, Matthias Frei, Marten Gartner, Hamed Haddadi, Jordi Subirà Nieto, Adrian Perrig, Philipp Winter, François Wirz:
Tango or Square Dance? How Tightly Should we Integrate Network Functionality in Browsers? CoRR abs/2210.04791 (2022) - [i11]Alex Davidson, Gonçalo Pestana, Sofía Celi:
FrodoPIR: Simple, Scalable, Single-Server Private Information Retrieval. IACR Cryptol. ePrint Arch. 2022: 981 (2022) - 2021
- [c7]Martin R. Albrecht, Alex Davidson, Amit Deo, Nigel P. Smart:
Round-Optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices. Public Key Cryptography (2) 2021: 261-289 - [i10]Muhammad Haris Mughees, Gonçalo Pestana, Alex Davidson, Benjamin Livshits:
PrivateFetch: Scalable Catalog Delivery in Privacy-Preserving Advertising. CoRR abs/2109.08189 (2021) - [i9]Alex Davidson, Peter Snyder, E. B. Quirk, Joseph Genereux, Benjamin Livshits:
STAR: Distributed Secret Sharing for Private Threshold Aggregation Reporting. CoRR abs/2109.10074 (2021) - 2020
- [c6]Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model. CRYPTO (1) 2020: 559-589 - [i8]Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model. IACR Cryptol. ePrint Arch. 2020: 111 (2020)
2010 – 2019
- 2019
- [c5]Alex Davidson, Amit Deo, Ela Lee, Keith Martin:
Strong Post-Compromise Secure Proxy Re-Encryption. ACISP 2019: 58-77 - [i7]Alex Davidson, Amit Deo, Ela Lee, Keith Martin:
Strong Post-Compromise Secure Proxy Re-Encryption. IACR Cryptol. ePrint Arch. 2019: 368 (2019) - [i6]Martin R. Albrecht, Alex Davidson, Amit Deo, Nigel P. Smart:
Round-optimal Verifiable Oblivious Pseudorandom Functions From Ideal Lattices. IACR Cryptol. ePrint Arch. 2019: 1271 (2019) - 2018
- [j1]Alex Davidson, Ian Goldberg, Nick Sullivan, George Tankersley, Filippo Valsorda:
Privacy Pass: Bypassing Internet Challenges Anonymously. Proc. Priv. Enhancing Technol. 2018(3): 164-180 (2018) - [c4]Martin R. Albrecht, Benjamin R. Curtis, Amit Deo, Alex Davidson, Rachel Player, Eamonn W. Postlethwaite, Fernando Virdia, Thomas Wunderer:
Estimate All the {LWE, NTRU} Schemes! SCN 2018: 351-367 - [i5]Martin R. Albrecht, Benjamin R. Curtis, Amit Deo, Alex Davidson, Rachel Player, Eamonn W. Postlethwaite, Fernando Virdia, Thomas Wunderer:
Estimate all the {LWE, NTRU} schemes! IACR Cryptol. ePrint Arch. 2018: 331 (2018) - [i4]Alex Davidson, Ryo Nishimaki:
A Bit-fixing PRF with O(1) Collusion-Resistance from LWE. IACR Cryptol. ePrint Arch. 2018: 890 (2018) - [i3]Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada:
Constrained PRFs for Bit-fixing from OWFs with Constant Collusion Resistance. IACR Cryptol. ePrint Arch. 2018: 982 (2018) - 2017
- [c3]Alex Davidson, Carlos Cid:
An Efficient Toolkit for Computing Private Set Operations. ACISP (2) 2017: 261-278 - [c2]Martin R. Albrecht, Alex Davidson, Enrique Larraia:
Notes on GGH13 Without the Presence of Ideals. IMACC 2017: 135-158 - [i2]Martin R. Albrecht, Alex Davidson, Enrique Larraia, Alice Pellet-Mary:
Notes On GGH13 Without The Presence Of Ideals. IACR Cryptol. ePrint Arch. 2017: 906 (2017) - 2016
- [c1]Alex Davidson, Gregory Fenn, Carlos Cid:
A Model for Secure and Mutually Beneficial Software Vulnerability Sharing. WISCS@CCS 2016: 3-14 - [i1]Alex Davidson, Carlos Cid:
Computing Private Set Operations with Linear Complexities. IACR Cryptol. ePrint Arch. 2016: 108 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-07 01:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint