The following is a chronological list of most of my publications. Please see my Google Scholar profile and DBLP page for the PDFs.

with Saba Eskandarian, Mihai Christodorescu
Privacy-Preserving Payment Splitting.
PETS 2020

with Shashank Agrawal, Mihai Christodorescu, Pratyay Mukherjee, Peter Rindal, Gaven Watson
Rolling the DiSE: Taking Threshold Encryption to Enterprise.
RWC 2020

with Shashank Agrawal, Pratyay Mukherjee, Peter Rindal
DiSE: Distributed Symmetric-key Encryption.
ACM CCS 2018

with Shashank Agrawal, Peihan Miao, Pratyay Mukherjee
PASTA: PASsword-based Threshold Authentication.
ACM CCS 2018

with Peter Rindal
ABY3: A Mixed Protocol Framework for Machine Learning.
ACM CCS 2018

with Shashank Agrawal and Chaya Ganesh
Non-Interactive Zero-Knowledge Proofs for Composite Statements.

with Nishanth Chandran, Juan Garay, and Satyanarayana Vusirikala
Efficient Constant-Round and Actively Secure MPC: Beyond the Three-Party Case.
ACM CCS 2017

with Yupeng Zhang
SecureML: A System for Scalable Privacy-Preserving Machine Learning.
IEEE S&P 2017

with Mike Rosulek and Alessandra Scafuro
Sublinear Zero-Knowledge Arguments for RAM Programs.

with Mike Rosulek
Non-Interactive Secure 2PC in the Offline/Online and Batch Settings.

with Ian Miers
IO-DSSE: Scaling Dynamic Searchable Encryption to Millions of Indexes By Improving Locality.
NDSS 2017

with Sanjam Garg and Charalampos Papamanthou
TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption.

with Melissa Chase and Chaya Ganesh
Efficient Zero-Knowledge Proof of Algebraic and Non-Algebraic Statements with Applications to Privacy Preserving Credentials.

with Alptekin Kupcu
Fast Optimistically Fair Cut-and-Choose 2PC.
FC 2016

with Ostap Orobetes and Ben Riva
Efficient Server-Aided 2PC for Mobile Phones.
PETS 2016

with Mike Rosulek and Ye Zhang
Fast and Secure Three-party Computation: The Garbled Circuit Approach.
ACM CCS 2015

with Zhangxiang Hu and Mike Rosulek
Efficient Zero-Knowledge Proofs of Non-Algebraic Statements with Sublinear Amortized Cost.

with Arash Afshar and Zhangxiang Hu and Mike Rosulek
How to Efficiently Evaluate RAM Programs with Malicious Security.

with Vladimir Kolesnikov and Ben Riva and Mike Rosulek
Richer Efficiency/Security Trade-offs in 2PC.
TCC 2015

with Saeed Sadeghian and Nigel Smart
Actively Secure Private Function Evaluation.

with Vladimir Kolesnikov and Mike Rosulek
FleXOR: Flexible garbling for XOR gates that beats free-XOR.

with Arash Afshar, Benny Pinkas, and Ben Riva
Non-Interactive Secure Computation Based on Cut-and-Choose.

with Seny Kamara, Mariana Raykova, and Saeed Sadeghian
Scaling Private Set Intersection to Billion-Element Sets.
FC 2014

with Dana Dachman-Soled and George Fuchsbauer and Adam O’Neill
Enhance Chosen-Ciphertext Security and Applications.
PKC 2014

with Ebrahim Tarameshloo and Philip W. L. Fong
On Protection in Federated Social Computing Systems.

with Ben Riva
Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation.

with Isheeta Nargis and Wayne Eberly
Efficient Multiparty Computation for Arithmetic Circuits against a Covert Majority.

with Saeed Sadeghian
How to Hide Circuits in MPC: An Efficient Framework for Private Function Evaluation.[Full Version][Long Talk]

with Salman Niksefat, Babak Sadeghiyan, and Saeed Sadeghian
ZIDS: A Privacy-Preserving Intrusion Detection System Using Secure Two-Party Computation Protocols
The Computer Journal, 2013, doi: 10.1093/comjnl/bxt019

with Ozgur Dagdelen and Daniele Venturi
Rate-limited Secure Function Evaluation: Definitions and Constructions.
PKC 2013

with Salman Niksefat and Babak Sadeghiyan
Oblivious Decision Program Evaluation.
In IET Information Security Journal, 2013, doi: 10.1049/iet-ifs.2012.0032

with Seny Kamara and Ben Riva
Salus: A System for Server-Aided Secure Function Evaluation.
ACM CCS 2012.

with Salman Niksefat
Oblivious Decision Programs from Oblivious Transfer: Efficient Reductions.
FC 2012

with Salman Niksefat, Saeed Sadeghian, and Babak Sadeghiyan
An Efficient Protocol for Oblivious DFA Evaluation and Applications.
CT-RSA 2012.

with Seny Kamara, and Mariana Raykova
Outsourcing Multiparty Computation.

eprint archive 2011

Fast Computation On Encrypted Polynomials and Applications.
CANS 2011

A Closer Look at Anonymity and Robustness in Encryption Schemes.

One-time Signatures and Chameleon Hash Functions.
SAC 2010

with Matthew Franklin
Secure and Efficient Evaluation of Multivariate Polynomials and Applications.
ACNS 2010

with Eike Kiltz and Adam O’Neill.
Adaptive Trapdoor Functions and Chosen Ciphertext Security.

with Mark Gondree
Longest Common Subsequence as Private Search.
ACM WPES 2009 

with Matthew Franklin and Mark Gondree.
Communication-Efficient Private Protocols for Longest Common Subsequence.
CT-RSA 2009 .

with Enav Weinreb.
Efficient Secure Linear Algebra In Presence of Covert or Computationally Unbounded Adversaries.

with Vipul Goyal and Adam Smith.
Secure Two-party and Multi-party Computation against Covert Adversaries.

with Mark Gondree and Matthew Franklin.
Multiparty Indirect Indexing and Applications.

with Nenad Dedic.
Constant-Round Private Database Queries .
ICALP 2007

with Eike Kiltz and Enav Weinreb and Matthew Franklin.
Secure Linear Algebra Using Linearly Recurrent Sequences.
TCC 2007 .

with Matthew Franklin and Mark Gondree.
Improved Efficiency for Private Stable Matching.
CT-RSA 2007 .

with Matthew Franklin.
Efficiency Tradeoffs for Malicious Two-Party Computation.
PKC 2006

with Matthew Franklin.
Efficient Polynomial Operations in the Shared-Coefficients Setting.
PKC 2006 .

with Gergei Bana and Till Stegers.
Computational Soundness of Formal Indistinguishability and Static Equivalence.
ASIAN 2006 .