| 12395317 |
Cryptographic computation techniques for multi-party reach and frequency |
Evgeny Skvortsov |
2025-08-19 |
| 12244693 |
Multi-key information retrieval |
Eli Simon Fox-Epstein, Craig Wright, Kevin Yeo, Karn Seth |
2025-03-04 |
| 12192342 |
Enhanced performance of secure multi-party computation |
Gang Wang, Sarvar Patel, Marcel M. Moti Yung, Karn Seth, Kevin Yeo +2 more |
2025-01-07 |
| 12050579 |
Oblivious RAM with logarithmic overhead |
Kevin Yeo, Sarvar Patel, Giuseppe Persiano |
2024-07-30 |
| 11962687 |
Methods for protecting privacy |
Sarvar Patel, Marcel M. Moti Yung, Gang Wang, Karn Seth, Benjamin Kreuter +1 more |
2024-04-16 |
| 11841973 |
Methods for aggregating credit across interactions |
Karn Seth, Sarvar Patel, Srinivasan Seshadri, Margo Narayan, Philip McDonnell +1 more |
2023-12-12 |
| 11626993 |
Network for improved verification speed with tamper resistant data |
Mahdi Zamani, Mahnush Movahedi |
2023-04-11 |
| 11544353 |
Oblivious RAM with logarithmic overhead |
Kevin Yeo, Sarvar Patel, Giuseppe Persiano |
2023-01-03 |
| 11023168 |
Oblivious RAM with logarithmic overhead |
Kevin Yeo, Sarvar Patel, Giuseppe Persiano |
2021-06-01 |
| 10033708 |
Secure computation using a server module |
Seny F. Kamara |
2018-07-24 |
| 9521124 |
Secure computation using a server module |
Seny F. Kamara |
2016-12-13 |
| 9191196 |
Secure computation using a server module |
Seny F. Kamara |
2015-11-17 |
| 8756410 |
Polynomial evaluation delegation |
Seny F. Kamara |
2014-06-17 |
| 8700906 |
Secure computing in multi-tenant data centers |
Seny F. Kamara |
2014-04-15 |
| 8539220 |
Secure computation using a server module |
Seny F. Kamara |
2013-09-17 |
| 8370621 |
Counting delegation using hidden vector encryption |
Seny F. Kamara |
2013-02-05 |