Sunoo Park
Sunoo Park
Verified email at
Cited by
Cited by
Spacecoin: A cryptocurrency based on proofs of space
S Park, K Pietrzak, J Alwen, G Fuchsbauer, P Gazi
IACR Cryptology ePrint Archive 2015, 528, 2015
Is public-key encryption based on LPN practical?
I Damgård, S Park
IACR Cryptol. ePrint Arch. 2012, 699, 2012
Practical accountability of secret processes
J Frankle, S Park, D Shaar, S Goldwasser, D Weitzner
27th {USENIX} Security Symposium ({USENIX} Security 18), 657-674, 2018
Adaptively secure coin-flipping, revisited
S Goldwasser, YT Kalai, S Park
International Colloquium on Automata, Languages, and Programming, 663-674, 2015
Towards secure quadratic voting
S Park, RL Rivest
Public Choice 172 (1-2), 151-175, 2017
How to incentivize data-driven collaboration among competing parties
PD Azar, S Goldwasser, S Park
Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016
How practical is public-key encryption based on LPN and ring-LPN
I Damgård, S Park
Cryptology ePrint Archive, Report 2012/699, 2012
Going from bad to worse: from internet voting to blockchain voting
S Park, M Specter, N Narula, RL Rivest
DRAFT, 2020
Public Accountability vs. Secret Laws: Can They Coexist? A Cryptographic Proposal
S Goldwasser, S Park
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, 99-110, 2017
Non-malleable commitments from non-malleable extractors
V Goyal, A Kumar, S Park, S Richelson, A Srinivasan
Manuscript, accessed via personal communication, 2018
Fully Deniable Interactive Encryption
R Canetti, S Park, O Poburinnaya
3SUM with preprocessing: Algorithms, lower bounds and cryptographic applications
A Golovnev, S Guo, T Horel, S Park, V Vaikuntanathan
arXiv preprint arXiv:1907.08355, 2019
It Wasn’t Me!
S Park, A Sealfon
Annual International Cryptology Conference, 159-190, 2019
How to subvert backdoored encryption: security against adversaries that decrypt all ciphertexts
T Horel, S Park, S Richelson, V Vaikuntanathan
arXiv preprint arXiv:1802.07381, 2018
On time and order in multiparty computation
P Azar, S Goldwasser, S Park
Cryptology ePrint Archive. Report 2015/178, 2015
Cryptographically blinded games: leveraging players' limitations for equilibria and profit
P Hubáček, S Park
Proceedings of the fifteenth ACM conference on Economics and computation …, 2014
Towards Optimally Efficient Secret-Key Authentication from PRG.
I Damgård, S Park
IACR Cryptol. ePrint Arch. 2014, 426, 2014
Static-memory-hard functions, and modeling the cost of space vs. time
T Dryja, QC Liu, S Park
Theory of Cryptography Conference, 33-66, 2018
Static-memory-hard functions and nonlinear space-time tradeoffs via pebbling
T Dryja, QC Liu, S Park
arXiv preprint arXiv:1802.07433, 2018
Data structures meet cryptography: 3SUM with preprocessing
A Golovnev, S Guo, T Horel, S Park, V Vaikuntanathan
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20