default search action
Kurt Rohloff
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [e9]Flávio Bergamaschi, Anamaria Costache, Kurt Rohloff:
Proceedings of the 12th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2024, ISBN 979-8-4007-1241-8 [contents] - 2023
- [c49]Michael Brenner, Anamaria Costache, Kurt Rohloff:
WAHC '23: 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography. CCS 2023: 3651-3652 - [e8]Michael Brenner, Anamaria Costache, Kurt Rohloff:
Proceedings of the 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, Copenhagen, Denmark, 26 November 2023. ACM 2023 [contents] - 2022
- [c48]Cavidan Yakupoglu, Kurt Rohloff:
Towards Efficient FHE Based cPIR Schemes and Their Parameter Selection. ARES 2022: 136:1-136:11 - [c47]Ahmad Al Badawi, Jack Bates, Flávio Bergamaschi, David Bruce Cousins, Saroja Erabelli, Nicholas Genise, Shai Halevi, Hamish Hunt, Andrey Kim, Yongwoo Lee, Zeyu Liu, Daniele Micciancio, Ian Quah, Yuriy Polyakov, R. V. Saraswathy, Kurt Rohloff, Jonathan Saylor, Dmitriy Suponitsky, Matthew Triplett, Vinod Vaikuntanathan, Vincent Zucca:
OpenFHE: Open-Source Fully Homomorphic Encryption Library. WAHC@CCS 2022: 53-63 - [c46]Michael Brenner, Anamaria Costache, Kurt Rohloff:
WAHC'22: 10th Workshop on Encrypted Computing and Applied Homomorphic Cryptography. CCS 2022: 3531-3532 - [c45]Cavidan Yakupoglu, Kurt Rohloff:
PREFHE, PREFHE-AES and PREFHE-SGX: Secure Multiparty Computation Protocols from Fully Homomorphic Encryption and Proxy ReEncryption with AES and Intel SGX. SecureComm 2022: 819-837 - [e7]Michael Brenner, Anamaria Costache, Kurt Rohloff:
Proceedings of the 10th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, Los Angeles, CA, USA, 7 November 2022. ACM 2022, ISBN 978-1-4503-9877-0 [contents] - [i10]Ahmad Al Badawi, Jack Bates, Flávio Bergamaschi, David Bruce Cousins, Saroja Erabelli, Nicholas Genise, Shai Halevi, Hamish Hunt, Andrey Kim, Yongwoo Lee, Zeyu Liu, Daniele Micciancio, Ian Quah, Yuriy Polyakov, R. V. Saraswathy, Kurt Rohloff, Jonathan Saylor, Dmitriy Suponitsky, Matthew Triplett, Vinod Vaikuntanathan, Vincent Zucca:
OpenFHE: Open-Source Fully Homomorphic Encryption Library. IACR Cryptol. ePrint Arch. 2022: 915 (2022) - 2021
- [j16]Ahmad Al Badawi, Yuriy Polyakov, Khin Mi Mi Aung, Bharadwaj Veeravalli, Kurt Rohloff:
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme. IEEE Trans. Emerg. Top. Comput. 9(2): 941-956 (2021) - [c44]Giovanni Di Crescenzo, Lisa Bahler, Brian A. Coan, Kurt Rohloff, David Bruce Cousins, Yuriy Polyakov:
Encrypted-Input Obfuscation of Image Classifiers. DBSec 2021: 136-156 - 2020
- [c43]Gyana Sahu, Kurt Rohloff:
Accelerating Lattice Based Proxy Re-encryption Schemes on GPUs. CANS 2020: 613-632 - [c42]Giovanni Di Crescenzo, Brian A. Coan, Lisa Bahler, Kurt Rohloff, Yuriy Polyakov, David Bruce Cousins:
Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input Obfuscation. CCSW 2020: 167
2010 – 2019
- 2019
- [j15]Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Hadi Sajjadpour, Erkay Savas:
Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices. IEEE Trans. Computers 68(4): 570-584 (2019) - [c41]Kurt Rohloff:
Computer Arithmetic Research to Accelerate Privacy-Protecting Encrypted Computing Such as Homomorphic Encryption. ARITH 2019: 197 - [c40]David W. Archer, José Manuel Calderón Trilla, Jason Dagit, Alex J. Malozemoff, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan:
RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications. WAHC@CCS 2019: 57-68 - [c39]Michael Brenner, Tancrède Lepoint, Kurt Rohloff:
WAHC'19: 7th Workshop on Encrypted Computing & Applied Homomorphic Cryptograph. CCS 2019: 2703-2704 - [c38]Yuki Yamada, Kurt Rohloff, Masato Oguchi:
Homomorphic Encryption for Privacy-Preserving Genome Sequences Search. SMARTCOMP 2019: 7-12 - [e6]Michael Brenner, Tancrède Lepoint, Kurt Rohloff:
Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography, WAHC@CCS 2019, London, UK, November 11-15, 2019. ACM 2019, ISBN 978-1-4503-6829-2 [contents] - [i9]Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Kurt Rohloff, Vinod Vaikuntanathan:
Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies. IACR Cryptol. ePrint Arch. 2019: 223 (2019) - [i8]David W. Archer, José Manuel Calderón Trilla, Jason Dagit, Alex J. Malozemoff, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan:
RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications. IACR Cryptol. ePrint Arch. 2019: 988 (2019) - 2018
- [j14]Wei Dai, Yarkin Doröz, Yuriy Polyakov, Kurt Rohloff, Hadi Sajjadpour, Erkay Savas, Berk Sunar:
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme. IEEE Trans. Inf. Forensics Secur. 13(5): 1169-1184 (2018) - [c37]Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savas:
Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors. WAHC@CCS 2018: 61-71 - [c36]Michael Brenner, Kurt Rohloff:
WAHC'18: 6th Workshop on Encrypted Computing and Applied Homomorphic Cryptography. CCS 2018: 2183-2184 - [c35]Lloyd G. Greenwald, Kurt Rohloff, David Stott:
Secure Proxy-Reencryption-Based Inter-Network Key Exchange. MILCOM 2018: 780-785 - [c34]Michael E. Houle, Vincent Oria, Kurt Rohloff, Arwa M. Wali:
LID-Fingerprint: A Local Intrinsic Dimensionality-Based Fingerprinting Method. SISAP 2018: 134-147 - [c33]David Bruce Cousins, Giovanni Di Crescenzo, Kamil Doruk Gür, Kevin King, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savas:
Implementing Conjunction Obfuscation Under Entropic Ring LWE. IEEE Symposium on Security and Privacy 2018: 354-371 - [c32]Giovanni Di Crescenzo, Lisa Bahler, Brian A. Coan, Kurt Rohloff, Yuriy Polyakov:
Intrusion-Resilient Classifier Approximation: From Wildcard Matching to Range Membership. TrustCom/BigDataSE 2018: 1885-1890 - [e5]Michael Brenner, Kurt Rohloff:
Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, WAHC@CCS 2018, Toronto, ON, Canada, October 19, 2018. ACM 2018, ISBN 978-1-4503-5987-0 [contents] - [i7]Ahmad Al Badawi, Yuriy Polyakov, Khin Mi Mi Aung, Bharadwaj Veeravalli, Kurt Rohloff:
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme. IACR Cryptol. ePrint Arch. 2018: 589 (2018) - [i6]Cheng Chen, Nicholas Genise, Daniele Micciancio, Yuriy Polyakov, Kurt Rohloff:
Implementing Token-Based Obfuscation under (Ring) LWE. IACR Cryptol. ePrint Arch. 2018: 1222 (2018) - 2017
- [j13]Cristian Borcea, Arnab Deb Gupta, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan:
PICADOR: End-to-end encrypted Publish-Subscribe information distribution with proxy re-encryption. Future Gener. Comput. Syst. 71: 177-191 (2017) - [j12]David Bruce Cousins, Kurt Rohloff, Daniel Sumorok:
Designing an FPGA-Accelerated Homomorphic Encryption Co-Processor. IEEE Trans. Emerg. Top. Comput. 5(2): 193-206 (2017) - [j11]Kurt Rohloff, David Bruce Cousins, Daniel Sumorok:
Scalable, Practical VoIP Teleconferencing With End-to-End Homomorphic Encryption. IEEE Trans. Inf. Forensics Secur. 12(5): 1031-1041 (2017) - [j10]Yuriy Polyakov, Kurt Rohloff, Gyana Sahu, Vinod Vaikuntanathan:
Fast Proxy Re-Encryption for Publish/Subscribe Systems. ACM Trans. Priv. Secur. 20(4): 14:1-14:31 (2017) - [c31]Roger Hallman, Kurt Rohloff, Victor Chang:
Workshop on Multimedia Privacy and Security. CCS 2017: 2645-2646 - [c30]Lisa Bahler, Giovanni Di Crescenzo, Yuriy Polyakov, Kurt Rohloff, David Bruce Cousins:
Practical Implementation of Lattice-Based Program Obfuscators for Point Functions. HPCS 2017: 761-768 - [e4]Roger A. Hallman, Kurt Rohloff, Victor I. Chang:
Proceedings of the 2017 on Multimedia Privacy and Security, MPS@CCS 2017, Dallas, TX, USA, October 30, 2017. ACM 2017, ISBN 978-1-4503-5206-2 [contents] - [e3]Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y. A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, Markus Jakobsson:
Financial Cryptography and Data Security - FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10323, Springer 2017, ISBN 978-3-319-70277-3 [contents] - [i5]Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savas:
Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors. IACR Cryptol. ePrint Arch. 2017: 285 (2017) - [i4]Yuriy Polyakov, Kurt Rohloff, Gyana Sahu, Vinod Vaikuntanathan:
Fast Proxy Re-Encryption for Publish/Subscribe Systems. IACR Cryptol. ePrint Arch. 2017: 410 (2017) - [i3]Wei Dai, Yarkin Doröz, Yuriy Polyakov, Kurt Rohloff, Hadi Sajjadpour, Erkay Savas, Berk Sunar:
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme. IACR Cryptol. ePrint Arch. 2017: 601 (2017) - [i2]David Bruce Cousins, Giovanni Di Crescenzo, Kamil Doruk Gür, Kevin King, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Erkay Savas:
Implementing Conjunction Obfuscation under Entropic Ring LWE. IACR Cryptol. ePrint Arch. 2017: 844 (2017) - [i1]Kamil Doruk Gür, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan, Hadi Sajjadpour, Erkay Savas:
Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices. IACR Cryptol. ePrint Arch. 2017: 1254 (2017) - 2016
- [c29]Arnab Deb Gupta, Yuriy Polyakov, Kurt Rohloff, Gerard W. Ryan:
Securely Sharing Encrypted Medical Information. CHASE 2016: 330-331 - [c28]Giovanni Di Crescenzo, Lisa Bahler, Brian A. Coan, Yuriy Polyakov, Kurt Rohloff, David Bruce Cousins:
Practical implementations of program obfuscators for point functions. HPCS 2016: 460-467 - [c27]Arnab Deb Gupta, Yuriy Polyakov, Kurt Rohloff:
Secure access delegation of encrypted medical information. ISMICT 2016: 1-5 - [e2]Jeremy Clark, Sarah Meiklejohn, Peter Y. A. Ryan, Dan S. Wallach, Michael Brenner, Kurt Rohloff:
Financial Cryptography and Data Security - FC 2016 International Workshops, BITCOIN, VOTING, and WAHC, Christ Church, Barbados, February 26, 2016, Revised Selected Papers. Lecture Notes in Computer Science 9604, Springer 2016, ISBN 978-3-662-53356-7 [contents] - 2015
- [j9]David W. Archer, Kurt Rohloff:
Computing with Data Privacy: Steps toward Realization. IEEE Secur. Priv. 13(1): 22-29 (2015) - [c26]Kurt Rohloff:
Privacy-Preserving Data Exfiltration Monitoring Using Homomorphic Encryption. CSCloud 2015: 48-53 - [c25]Kurt Rohloff, Yuriy Polyakov:
An end-to-end security architecture to collect, process and share wearable medical device data. HealthCom 2015: 615-620 - [e1]Michael Brenner, Nicolas Christin, Benjamin Johnson, Kurt Rohloff:
Financial Cryptography and Data Security - FC 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers. Lecture Notes in Computer Science 8976, Springer 2015, ISBN 978-3-662-48050-2 [contents] - 2014
- [c24]Kurt Rohloff, David Bruce Cousins:
A Scalable Implementation of Fully Homomorphic Encryption Built on NTRU. Financial Cryptography Workshops 2014: 221-234 - [c23]David Bruce Cousins, John Golusky, Kurt Rohloff, Daniel Sumorok:
An FPGA co-processor implementation of Homomorphic Encryption. HPEC 2014: 1-6 - 2013
- [c22]Kurt Rohloff, Jeffrey Cleveland, Joseph P. Loyall, Timothy Blocher:
SCIMITAR: Scalable Stream-Processing for Sensor Information Brokering. MILCOM 2013: 1856-1861 - [c21]Kurt Rohloff, Kyle Usbeck, Joseph P. Loyall:
GAMETE: general adaptable metric execution tool and environment (WIP). SpringSim (TMS-DEVS) 2013: 21 - 2012
- [c20]David Cousins, Kurt Rohloff, Chris Peikert, Richard E. Schantz:
An update on SIPHER (Scalable Implementation of Primitives for Homomorphic EncRyption) - FPGA implementation using Simulink. HPEC 2012: 1-5 - [c19]Kurt Rohloff:
Bounded sensor failure tolerant supervisory control. WODES 2012: 272-277 - 2011
- [c18]Kurt Rohloff, Richard E. Schantz:
Clause-iteration with MapReduce to scalably query datagraphs in the SHARD graph-store. DICT@HPDC 2011: 35-44 - [c17]Joseph P. Loyall, Kurt Rohloff, Partha P. Pal, Michael Atighetchi:
A Survey of Security Concepts for Common Operating Environments. ISORC Workshops 2011: 244-253 - [c16]Kurt Rohloff, Joseph P. Loyall:
An Ontology for Resource Sharing. ICSC 2011: 530-537 - 2010
- [c15]Kurt Rohloff, Richard E. Schantz:
High-performance, massively scalable distributed systems using the MapReduce software framework: the SHARD triple-store. PSI EtA 2010: 4 - [c14]Partha P. Pal, Kurt Rohloff, Michael Atighetchi, Richard E. Schantz:
Managed Mission Assurance - Concept, Methodology and Runtime Support. SocialCom/PASSAT 2010: 1159-1164
2000 – 2009
- 2009
- [c13]Kurt Rohloff, Victor Asal:
Computational Methods to Discover Sets of Patterns of Behaviors that Precede Political Events of Interest. AAAI Spring Symposium: Technosocial Predictive Analytics 2009: 120-125 - 2008
- [j8]Kurt Rohloff, Tamer Basar:
Deterministic and stochastic models for the detection of random constant scanning worms. ACM Trans. Model. Comput. Simul. 18(2): 8:1-8:24 (2008) - 2007
- [c12]Matthew Gillen, Kurt Rohloff, Prakash Manghwani, Richard E. Schantz:
Scalable, Adaptive, Time-Bounded Node Failure Detection. HASE 2007: 179-186 - [c11]Kurt Rohloff, Joseph P. Loyall, Partha P. Pal, Richard E. Schantz:
High-Assurance Distributed, Adaptive Software for Dynamic Systems. HASE 2007: 385-386 - [c10]Kurt Rohloff, Yarom Gabay, Jianming Ye, Richard E. Schantz:
Scalable, Distributed, Dynamic Resource Management for the ARMS Distributed Real-Time Embedded System. IPDPS 2007: 1-7 - [c9]Kurt Rohloff, Mike Dean, Ian Emmons, Dorene Ryder, John Sumner:
An Evaluation of Triple-Store Technologies for Large Data Stores. OTM Workshops (2) 2007: 1105-1114 - [c8]Kurt Rohloff, Richard E. Schantz, Yarom Gabay:
High-level dynamic resource management for distributed, real-time embedded systems. SCSC 2007: 749-756 - 2006
- [j7]Kurt Rohloff, Samir Khuller, Guy Kortsarz:
Approximating the Minimal Sensor Selection for Supervisory Control. Discret. Event Dyn. Syst. 16(1): 143-170 (2006) - [j6]Kurt Rohloff, Stéphane Lafortune:
The Verification and Control of Interacting Similar Discrete-Event Systems. SIAM J. Control. Optim. 45(2): 634-667 (2006) - [j5]Kurt Rohloff, Joseph P. Loyall, Richard E. Schantz:
Quality measures for embedded systems and their application to control and certification. SIGBED Rev. 3(4): 58-62 (2006) - 2005
- [j4]Kurt Rohloff, Stéphane Lafortune:
PSPACE-completeness of Modular Supervisory Control Problems*. Discret. Event Dyn. Syst. 15(2): 145-167 (2005) - [j3]Yiping Cheng, Da-Zhong Zheng, Kurt Rohloff, Stéphane Lafortune, Xi-Ren Cao:
Contributing Authors. Discret. Event Dyn. Syst. 15(2): 199-200 (2005) - [c7]Kurt Rohloff:
The Diagnosis of Failures Via the Combination of Distributed Observations. ISIC 2005: 883-888 - [c6]Kurt Rohloff:
Sensor Failure Tolerant Supervisory Control. CDC/ECC 2005: 3493-3498 - [c5]Kurt Rohloff, Tamer Basar:
Stochastic behavior of random constant scanning worms. ICCCN 2005: 339-344 - [c4]Kurt Rohloff, Tamer Basar:
The detection of RCS worm epidemics. WORM 2005: 81-86 - 2004
- [b1]Kurt Rohloff:
Computations on distributed discrete -event systems. University of Michigan, USA, 2004 - [c3]Kurt Rohloff, Stéphane Lafortune:
Symmetry reductions for a class of discrete-event systems. CDC 2004: 38-44 - 2003
- [j2]Kurt Rohloff, Stéphane Lafortune:
On the synthesis of safe control policies in decentralized control of discrete-event systems. IEEE Trans. Autom. Control. 48(6): 1064-1068 (2003) - [j1]Kurt Rohloff, Tae-Sic Yoo, Stéphane Lafortune:
Deciding co-observability is PSPACE-complete. IEEE Trans. Autom. Control. 48(11): 1995-1999 (2003) - [c2]Kurt Rohloff, Stéphane Lafortune:
The control and verification of similar agents operating in a broadcast network environment. CDC 2003: 2673-2679 - 2002
- [c1]Kurt Rohloff, Stéphane Lafortune:
On the computational complexity of the verification of modular discrete-event systems. CDC 2002: 16-21
Coauthor Index
aka: David Bruce Cousins
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-22 20:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint