Oblivious {Multi-Party} machine learning on trusted processors O Ohrimenko, F Schuster, C Fournet, A Mehta, S Nowozin, K Vaswani, ... 25th USENIX Security Symposium (USENIX Security 16), 619-636, 2016 | 665 | 2016 |
Forward and backward private searchable encryption from constrained cryptographic primitives R Bost, B Minaud, O Ohrimenko Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 449 | 2017 |
Strong and efficient cache {Side-Channel} protection using hardware transactional memory D Gruss, J Lettner, F Schuster, O Ohrimenko, I Haller, M Costa 26th USENIX Security Symposium (USENIX Security 17), 217-233, 2017 | 329 | 2017 |
Propagation via lazy clause generation O Ohrimenko, PJ Stuckey, M Codish Constraints 14, 357-391, 2009 | 311 | 2009 |
Privacy-preserving group data access via stateless oblivious RAM simulation MT Goodrich, M Mitzenmacher, O Ohrimenko, R Tamassia Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete …, 2012 | 280 | 2012 |
Oblivious RAM simulation with efficient worst-case access overhead MT Goodrich, M Mitzenmacher, O Ohrimenko, R Tamassia Proceedings of the 3rd ACM workshop on Cloud computing security workshop, 95-100, 2011 | 175 | 2011 |
Structured encryption and leakage suppression S Kamara, T Moataz, O Ohrimenko Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 132 | 2018 |
Analyzing information leakage of updates to natural language models S Zanella-Béguelin, L Wutschitz, S Tople, V Rühle, A Paverd, ... Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 123 | 2020 |
Practical oblivious storage MT Goodrich, M Mitzenmacher, O Ohrimenko, R Tamassia Proceedings of the second ACM conference on Data and Application Security …, 2012 | 108 | 2012 |
Observing and preventing leakage in MapReduce O Ohrimenko, M Costa, C Fournet, C Gkantsidis, M Kohlweiss, D Sharma Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 106 | 2015 |
Propagation= lazy clause generation O Ohrimenko, PJ Stuckey, M Codish Principles and Practice of Constraint Programming–CP 2007: 13th …, 2007 | 104 | 2007 |
Contamination attacks and mitigation in multi-party machine learning J Hayes, O Ohrimenko Advances in neural information processing systems 31, 2018 | 101 | 2018 |
Hash first, argue later: Adaptive verifiable computations on outsourced data D Fiore, C Fournet, E Ghosh, M Kohlweiss, O Ohrimenko, B Parno Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 95 | 2016 |
Leakage of dataset properties in {Multi-Party} machine learning W Zhang, S Tople, O Ohrimenko 30th USENIX security symposium (USENIX Security 21), 2687-2704, 2021 | 93* | 2021 |
The Melbourne shuffle: Improving oblivious storage in the cloud O Ohrimenko, MT Goodrich, R Tamassia, E Upfal Automata, Languages, and Programming: 41st International Colloquium, ICALP …, 2014 | 85 | 2014 |
CCF: A framework for building confidential verifiable replicated services M Russinovich, E Ashton, C Avanessians, M Castro, A Chamayou, ... Microsoft, Redmond, WA, USA, Tech. Rep. MSR-TR-2019-16, 2019 | 83 | 2019 |
Sorting and searching behind the curtain F Baldimtsi, O Ohrimenko Financial Cryptography and Data Security: 19th International Conference, FC …, 2015 | 83 | 2015 |
Privacy-preserving machine learning MSDS Costa, CAMC Fournet, A Mehta, S Nowozin, O Ohrimenko, ... US Patent App. 15/245,141, 2017 | 53 | 2017 |
Haze: Privacy-preserving real-time traffic statistics JWS Brown, O Ohrimenko, R Tamassia Proceedings of the 21st ACM SIGSPATIAL international conference on advances …, 2013 | 48 | 2013 |
An algorithmic framework for differentially private data analysis on trusted processors J Allen, B Ding, J Kulkarni, H Nori, O Ohrimenko, S Yekhanin Advances in Neural Information Processing Systems 32, 2019 | 45 | 2019 |