default search action
Sunoo Park
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2018
- [b1]Sunoo Park:
Cryptography for societal benefit. Massachusetts Institute of Technology, Cambridge, USA, 2018
Journal Articles
- 2023
- [j2]Jack Cable, Andrés Fábrega, Sunoo Park, Michael A. Specter:
A systematization of voter registration security. J. Cybersecur. 9(1) (2023) - 2021
- [j1]Sunoo Park, Michael A. Specter, Neha Narula, Ronald L. Rivest:
Going from bad to worse: from Internet voting to blockchain voting. J. Cybersecur. 7(1) (2021)
Conference and Workshop Papers
- 2023
- [c15]Sunoo Park, Nicholas Spooner:
The Superlinearity Problem in Post-quantum Blockchains. FC (1) 2023: 200-217 - 2022
- [c14]Ero Balsa, Helen Nissenbaum, Sunoo Park:
Cryptography, Trust and Privacy: It's Complicated. CSLAW 2022: 167-179 - 2021
- [c13]Michael A. Specter, Sunoo Park, Matthew Green:
KeyForge: Non-Attributable Email from Forward-Forgeable Signatures. USENIX Security Symposium 2021: 1755-1773 - 2020
- [c12]Ran Canetti, Sunoo Park, Oxana Poburinnaya:
Fully Deniable Interactive Encryption. CRYPTO (1) 2020: 807-835 - [c11]Alexander Golovnev, Siyao Guo, Thibaut Horel, Sunoo Park, Vinod Vaikuntanathan:
Data structures meet cryptography: 3SUM with preprocessing. STOC 2020: 294-307 - 2019
- [c10]Sunoo Park, Adam Sealfon:
It Wasn't Me! - Repudiability and Claimability of Ring Signatures. CRYPTO (3) 2019: 159-190 - [c9]Thibaut Horel, Sunoo Park, Silas Richelson, Vinod Vaikuntanathan:
How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts. ITCS 2019: 42:1-42:20 - 2018
- [c8]Sunoo Park, Albert Kwon, Georg Fuchsbauer, Peter Gazi, Joël Alwen, Krzysztof Pietrzak:
SpaceMint: A Cryptocurrency Based on Proofs of Space. Financial Cryptography 2018: 480-499 - [c7]Karim Eldefrawy, Rafail Ostrovsky, Sunoo Park, Moti Yung:
Proactive Secure Multiparty Computation with a Dishonest Majority. SCN 2018: 200-215 - [c6]Thaddeus Dryja, Quanquan C. Liu, Sunoo Park:
Static-Memory-Hard Functions, and Modeling the Cost of Space vs. Time. TCC (1) 2018: 33-66 - [c5]Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel J. Weitzner:
Practical Accountability of Secret Processes. USENIX Security Symposium 2018: 657-674 - 2017
- [c4]Shafi Goldwasser, Sunoo Park:
Public Accountability vs. Secret Laws: Can They Coexist?: A Cryptographic Proposal. WPES@CCS 2017: 99-110 - 2016
- [c3]Pablo Daniel Azar, Shafi Goldwasser, Sunoo Park:
How to Incentivize Data-Driven Collaboration Among Competing Parties. ITCS 2016: 213-225 - 2015
- [c2]Shafi Goldwasser, Yael Tauman Kalai, Sunoo Park:
Adaptively Secure Coin-Flipping, Revisited. ICALP (2) 2015: 663-674 - 2014
- [c1]Pavel Hubácek, Sunoo Park:
Cryptographically blinded games: leveraging players' limitations for equilibria and profit. EC 2014: 207-208
Informal and Other Publications
- 2022
- [i23]Douglas W. Jones, Sunoo Park, Ronald L. Rivest, Adam Sealfon:
Scan, Shuffle, Rescan: Machine-Assisted Election Audits With Untrusted Scanners. IACR Cryptol. ePrint Arch. 2022: 960 (2022) - [i22]Sunoo Park, Nicholas Spooner:
The Superlinearity Problem in Post-Quantum Blockchains. IACR Cryptol. ePrint Arch. 2022: 1423 (2022) - [i21]Jack Cable, Andrés Fábrega, Sunoo Park, Michael A. Specter:
A Systematization of Voter Registration Security. IACR Cryptol. ePrint Arch. 2022: 1562 (2022) - 2019
- [i20]Michael A. Specter, Sunoo Park, Matthew Green:
KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures. CoRR abs/1904.06425 (2019) - [i19]Alexander Golovnev, Siyao Guo, Thibaut Horel, Sunoo Park, Vinod Vaikuntanathan:
3SUM with Preprocessing: Algorithms, Lower Bounds and Cryptographic Applications. CoRR abs/1907.08355 (2019) - [i18]Sunoo Park, Adam Sealfon:
It wasn't me! Repudiability and Unclaimability of Ring Signatures. IACR Cryptol. ePrint Arch. 2019: 135 (2019) - [i17]Michael A. Specter, Sunoo Park, Matthew Green:
KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures. IACR Cryptol. ePrint Arch. 2019: 390 (2019) - 2018
- [i16]Thibaut Horel, Sunoo Park, Silas Richelson, Vinod Vaikuntanathan:
How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts. CoRR abs/1802.07381 (2018) - [i15]Thaddeus Dryja, Quanquan C. Liu, Sunoo Park:
Static-Memory-Hard Functions and Nonlinear Space-Time Tradeoffs via Pebbling. CoRR abs/1802.07433 (2018) - [i14]Thaddeus Dryja, Quanquan C. Liu, Sunoo Park:
Static-Memory-Hard Functions and Nonlinear Space-Time Tradeoffs via Pebbling. IACR Cryptol. ePrint Arch. 2018: 205 (2018) - [i13]Thibaut Horel, Sunoo Park, Silas Richelson, Vinod Vaikuntanathan:
How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts. IACR Cryptol. ePrint Arch. 2018: 212 (2018) - [i12]Shafi Goldwasser, Sunoo Park:
Public Accountability vs. Secret Laws: Can They Coexist? IACR Cryptol. ePrint Arch. 2018: 664 (2018) - [i11]Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel J. Weitzner:
Practical Accountability of Secret Processes. IACR Cryptol. ePrint Arch. 2018: 697 (2018) - [i10]Ran Canetti, Sunoo Park, Oxana Poburinnaya:
Fully Bideniable Interactive Encryption. IACR Cryptol. ePrint Arch. 2018: 1244 (2018) - 2016
- [i9]Pablo Azar, Shafi Goldwasser, Sunoo Park:
How to Incentivize Data-Driven Collaboration Among Competing Parties. CoRR abs/1601.02298 (2016) - [i8]Sunoo Park, Ronald L. Rivest:
Towards Secure Quadratic Voting. IACR Cryptol. ePrint Arch. 2016: 400 (2016) - 2015
- [i7]Shafi Goldwasser, Yael Tauman Kalai, Sunoo Park:
Adaptively Secure Coin-Flipping, Revisited. CoRR abs/1503.01588 (2015) - [i6]Pablo Azar, Shafi Goldwasser, Sunoo Park:
How to Incentivize Data-Driven Collaboration Among Competing Parties. IACR Cryptol. ePrint Arch. 2015: 178 (2015) - [i5]Shafi Goldwasser, Yael Tauman Kalai, Sunoo Park:
Adaptively Secure Coin-Flipping, Revisited. IACR Cryptol. ePrint Arch. 2015: 202 (2015) - [i4]Sunoo Park, Krzysztof Pietrzak, Albert Kwon, Joël Alwen, Georg Fuchsbauer, Peter Gazi:
Spacemint: A Cryptocurrency Based on Proofs of Space. IACR Cryptol. ePrint Arch. 2015: 528 (2015) - 2014
- [i3]Pavel Hubácek, Sunoo Park:
Cryptographically Blinded Games: Leveraging Players' Limitations for Equilibria and Profit. CoRR abs/1411.3747 (2014) - [i2]Ivan Damgård, Sunoo Park:
Towards Optimally Efficient Secret-Key Authentication from PRG. IACR Cryptol. ePrint Arch. 2014: 426 (2014) - 2012
- [i1]Ivan Damgård, Sunoo Park:
Is Public-Key Encryption Based on LPN Practical? IACR Cryptol. ePrint Arch. 2012: 699 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint