Alex J. Malozemoff [CV]

I now work at Galois

Research Interests:

Cryptography · Computer Security

Publications:

  1. K. Lewi, A.J. Malozemoff, D. Apon, B. Carmer, A. Foltzer, D. Wagner, D.W. Archer, D. Boneh, J. Katz, M. Raykova. "5Gen: A framework for prototyping applications using multilinear maps and matrix branching programs." CCS, Vienna, Austria, October 24-28, 2016. ePrint.
  2. V. Kolesnikov, H. Krawczyk, Y. Lindell, A.J. Malozemoff, T. Rabin. "Attribute-based key exchange with general policies." CCS, Vienna, Austria, October 24-28, 2016. ePrint.
  3. M.D. Green, J. Katz, A.J. Malozemoff, H-S. Zhou. "A unified approach to idealized model separations via indistinguishability obfuscation." SCN, Amalfi, Italy, August 31 - September 2, 2016. To Appear. ePrint.
  4. V. Kolesnikov, A.J. Malozemoff. "Public verifiability in the covert model (almost) for free." Asiacrypt, Auckland, New Zealand, November 29 - December 3, 2015. ePrint.
  5. V.T. Hoang, J. Katz, A.J. Malozemoff. "Automated analysis and synthesis of authenticated encryption schemes." ACM CCS, Denver, Colorado, USA, October 12-16, 2015. ePrint. Slides. Code.
    Recipient of the Best Paper Award.
  6. Y. Huang, J. Katz, V. Kolesnikov, R. Kumaresan, A.J. Malozemoff. "Amortizing garbled circuits." Crypto, Santa Barbara, California, USA, August 17-21, 2014. ePrint.
  7. S.G. Choi, J. Katz, A.J. Malozemoff, V. Zikas. "Efficient three-party computation from cut-and-choose." Crypto, Santa Barbara, California, USA, August 17-21, 2014. ePrint. Slides.
  8. A.J. Malozemoff, J. Katz, M.D. Green. "Automated analysis and synthesis of block-cipher modes of operation." IEEE CSF, Vienna, Austria, July 19-22, 2014. ePrint. Slides. Code.
  9. D. Apon, J. Katz, A.J. Malozemoff. "One-round multi-party communication complexity of distinguishing sums." Theoretical Computer Science 501:101-108, 2013. ECCC. arXiv.

Preprints:

  1. A. Groce, A. Ledger, A.J. Malozemoff, A. Yerukhimovich. "CompGC: Efficient offline/online semi-honest two-party computation." 2016. ePrint.
  2. J. Katz, A.J. Malozemoff, X. Wang. "Efficiently enforcing input validity in secure two-party computation." 2016. ePrint.
  3. D. Apon, Y. Huang, J. Katz, A.J. Malozemoff. "Implementing cryptographic program obfuscation." 2014. ePrint. Code. Website.

Talks:

  1. "Automated analysis and synthesis of modes of operation and authenticated encryption schemes." Presented at the IACR School on Computer-aided Cryptography, University of Maryland, College Park, Maryland, USA, June 1-4, 2015. Slides.
  2. "Automated analysis and synthesis of block-cipher modes of operation." Presented at the Fall Protocol eXchange, National Cryptologic Museum, Fort Meade, Maryland, USA, September 23-24, 2014. Slides.
  3. "Implementing cryptographic program obfuscation." Presented at the CRYPTO 2014 Rump Session, Santa Barbara, California, USA, August 19, 2014. Slides.
  4. "Efficient three-party computation from cut-and-choose." Presented at the Workshop on Applied Multi-Party Computation, Redmond, Washington, USA, February 20-21, 2014. Slides.

Posters:

  1. "Automated analysis and synthesis of block-cipher modes of operation." Presented at the Third Annual Maryland Cybersecurity Symposium, College Park, Maryland, USA, June 10, 2014. Poster.

Other:

GitHub
Google Scholar
LinkedIn
Twitter
UFOs
Endurance


Last updated: November 08 2016