Follow
Sunoo Park
Sunoo Park
Verified email at csail.mit.edu
Title
Cited by
Cited by
Year
Spacemint: A cryptocurrency based on proofs of space
S Park, A Kwon, G Fuchsbauer, P Gaži, J Alwen, K Pietrzak
International Conference on Financial Cryptography and Data Security, 480-499, 2018
2102018
Going from bad to worse: from internet voting to blockchain voting
S Park, M Specter, N Narula, RL Rivest
Journal of Cybersecurity 7 (1), tyaa025, 2021
532021
Practical accountability of secret processes
J Frankle, S Park, D Shaar, S Goldwasser, D Weitzner
27th USENIX Security Symposium (USENIX Security 18), 657-674, 2018
472018
Is public-key encryption based on LPN practical?
I Damgård, S Park
IACR Cryptol. ePrint Arch. 2012, 699, 2012
272012
Adaptively secure coin-flipping, revisited
S Goldwasser, YT Kalai, S Park
International Colloquium on Automata, Languages, and Programming, 663-674, 2015
232015
Fully deniable interactive encryption
R Canetti, S Park, O Poburinnaya
Annual International Cryptology Conference, 807-835, 2020
212020
Public accountability vs. secret laws: can they coexist? A cryptographic proposal
S Goldwasser, S Park
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, 99-110, 2017
192017
Towards secure quadratic voting
S Park, RL Rivest
Public Choice 172 (1), 151-175, 2017
162017
How to incentivize data-driven collaboration among competing parties
PD Azar, S Goldwasser, S Park
Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016
142016
How practical is public-key encryption based on LPN and ring-LPN?
I Damgård, S Park
Cryptology ePrint Archive, 2012
142012
How to subvert backdoored encryption: security against adversaries that decrypt all ciphertexts
T Horel, S Park, S Richelson, V Vaikuntanathan
arXiv preprint arXiv:1802.07381, 2018
132018
It wasn’t me!
S Park, A Sealfon
Annual International Cryptology Conference, 159-190, 2019
122019
Data structures meet cryptography: 3sum with preprocessing
A Golovnev, S Guo, T Horel, S Park, V Vaikuntanathan
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing …, 2020
82020
3SUM with preprocessing: Algorithms, lower bounds and cryptographic applications
A Golovnev, S Guo, T Horel, S Park, V Vaikuntanathan
arXiv preprint arXiv:1907.08355, 2019
82019
Non-malleable commitments from non-malleable extractors
V Goyal, A Kumar, S Park, S Richelson, A Srinivasan
Manuscript, accessed via personal communication, 2018
72018
Static-memory-hard functions, and modeling the cost of space vs. time
T Dryja, QC Liu, S Park
Theory of Cryptography Conference, 33-66, 2018
52018
Spacecoin: a cryptocurrency based on proofs of space
J Alwen, G Fuchsbauer, P Gazi, S Park, K Pietrzak
IACR Cryptol. ePrint Arch, 1-26, 2015
52015
AUDIT: Practical accountability of secret processes
J Frankle, S Park, D Shaar, S Goldwasser, DJ Weitzner
Cryptology ePrint Archive, 2018
32018
Public Accountability vs. Secret Laws: Can They Coexist?
S Goldwasser, S Park
Cryptology ePrint Archive, 2018
32018
On time and order in multiparty computation
P Azar, S Goldwasser, S Park
Cryptology ePrint Archive. Report 2015/178, 2015
32015
The system can't perform the operation now. Try again later.
Articles 1–20