@inproceedings{USENIX:PSSZ15,
  author    = {Benny Pinkas and
               Thomas Schneider and
               Gil Segev and
               Michael Zohner},
  editor    = {Jaeyeon Jung and
               Thorsten Holz},
  title     = {Phasing: Private Set Intersection Using Permutation-based Hashing},
  booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington,
               D.C., USA, August 12-14, 2015.},
  pages     = {515--530},
  publisher = {{USENIX} Association},
  year      = {2015},
  url       = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/pinkas},
  timestamp = {Fri, 19 Aug 2016 15:38:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/Pinkas0SZ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@inproceedings {usenix:PSZ14,
	author = {Benny Pinkas and Thomas Schneider and Michael Zohner},
	title = {Faster Private Set Intersection Based on {OT} Extension},
	booktitle = {23rd {USENIX} Security Symposium ({USENIX} Security 14)},
	year = {2014},
	isbn = {978-1-931971-15-7},
	address = {San Diego, CA},
	pages = {797--812},
	url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/pinkas},
	publisher = {{USENIX} Association},
}
 @INPROCEEDINGS{Mea86,
	author={C. Meadows},
	booktitle={1986 IEEE Symposium on Security and Privacy},
	title={A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third Party},
	year={1986},
	pages={134-134},
	keywords={Authentication;Cryptography;Generators;Helium;Organizations;Protocols;Zinc},
	doi={10.1109/SP.1986.10022},
	ISSN={1540-7993},
	month={April}
}

@inproceedings{secureML,
	author    = {Payman Mohassel and
	Yupeng Zhang},
	title     = {SecureML: {A} System for Scalable Privacy-Preserving Machine Learning},
	booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
	CA, USA, May 22-26, 2017},
	pages     = {19--38},
	publisher = {{IEEE} Computer Society},
	year      = {2017},
	url       = {https://doi.org/10.1109/SP.2017.12},
	doi       = {10.1109/SP.2017.12},
	timestamp = {Tue, 27 Jun 2017 13:01:20 +0200},
	biburl    = {http://dblp.org/rec/bib/conf/sp/MohasselZ17},
	bibsource = {dblp computer science bibliography, http://dblp.org}
}

@article{deanon0,
	author    = {Arvind Narayanan and
	Vitaly Shmatikov},
	title     = {How To Break Anonymity of the Netflix Prize Dataset},
	journal   = {CoRR},
	volume    = {abs/cs/0610105},
	year      = {2006},
	url       = {http://arxiv.org/abs/cs/0610105},
	archivePrefix = {arXiv},
	eprint    = {cs/0610105},
	timestamp = {Mon, 13 Aug 2018 16:48:47 +0200},
	biburl    = {https://dblp.org/rec/bib/journals/corr/abs-cs-0610105},
	bibsource = {dblp computer science bibliography, https://dblp.org}
}

@article{deanon1,
	author = {Merener, Martin M.},
	title = {Theoretical Results on De-Anonymization via Linkage Attacks},
	journal = {Trans. Data Privacy},
	issue_date = {August 2012},
	volume = {5},
	number = {2},
	month = aug,
	year = {2012},
	issn = {1888-5063},
	pages = {377--402},
	numpages = {26},
	url = {http://dl.acm.org/citation.cfm?id=2423651.2423652},
	acmid = {2423652},
	publisher = {IIIA-CSIC},
	address = {Catalonia, Spain},
} 
@InProceedings{deanon2,
	author="Datta, Anupam
	and Sharma, Divya
	and Sinha, Arunesh",
	editor="Degano, Pierpaolo
	and Guttman, Joshua D.",
	title="Provable De-anonymization of Large Datasets with Sparse Dimensions",
	booktitle="Principles of Security and Trust",
	year="2012",
	publisher="Springer Berlin Heidelberg",
	address="Berlin, Heidelberg",
	pages="229--248",
	isbn="978-3-642-28641-4"
}

@inproceedings{deanon4,
	author    = {Yuchen Zhao and
	Isabel Wagner},
	editor    = {Jong Kim and
	Gail{-}Joon Ahn and
	Seungjoo Kim and
	Yongdae Kim and
	Javier L{\'{o}}pez and
	Taesoo Kim},
	title     = {{POSTER:} Evaluating Privacy Metrics for Graph Anonymization and De-anonymization},
	booktitle = {Proceedings of the 2018 on Asia Conference on Computer and Communications
	Security, AsiaCCS 2018, Incheon, Republic of Korea, June 04-08, 2018},
	pages     = {817--819},
	publisher = {{ACM}},
	year      = {2018},
	url       = {http://doi.acm.org/10.1145/3196494.3201586},
	doi       = {10.1145/3196494.3201586},
	timestamp = {Mon, 04 Jun 2018 09:40:02 +0200},
	biburl    = {https://dblp.org/rec/bib/conf/ccs/ZhaoW18},
	bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{deanon3,
	author    = {Efe Onaran and
	Siddharth Garg and
	Elza Erkip},
	title     = {Optimal de-anonymization in random graphs with community structure},
	booktitle = {2016 37th {IEEE} Sarnoff Symposium, Newark, NJ, USA, September 19-21,
	2016},
	pages     = {1--2},
	publisher = {{IEEE}},
	year      = {2016},
	url       = {https://doi.org/10.1109/SARNOF.2016.7846734},
	doi       = {10.1109/SARNOF.2016.7846734},
	timestamp = {Thu, 25 May 2017 00:43:48 +0200},
	biburl    = {https://dblp.org/rec/bib/conf/sarnoff/OnaranGE16},
	bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{lowmc,
	author    = {Martin R. Albrecht and
	Christian Rechberger and
	Thomas Schneider and
	Tyge Tiessen and
	Michael Zohner},
	editor    = {Elisabeth Oswald and
	Marc Fischlin},
	title     = {Ciphers for {MPC} and {FHE}},
	booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
	Conference on the Theory and Applications of Cryptographic Techniques,
	Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
	series    = {Lecture Notes in Computer Science},
	volume    = {9056},
	pages     = {430--454},
	publisher = {Springer},
	year      = {2015},
	url       = {https://doi.org/10.1007/978-3-662-46800-5\_17},
	doi       = {10.1007/978-3-662-46800-5\_17},
	timestamp = {Wed, 24 May 2017 08:31:22 +0200},
	biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/AlbrechtR0TZ15},
	bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{HN12,
	author    = {Carmit Hazay and
	Kobbi Nissim},
	title     = {Efficient Set Operations in the Presence of Malicious Adversaries},
	journal   = {J. Cryptology},
	volume    = {25},
	number    = {3},
	pages     = {383--433},
	year      = {2012},
	url       = {https://doi.org/10.1007/s00145-011-9098-x},
	doi       = {10.1007/s00145-011-9098-x},
	timestamp = {Thu, 18 May 2017 09:52:09 +0200},
	biburl    = {https://dblp.org/rec/bib/journals/joc/HazayN12},
	bibsource = {dblp computer science bibliography, https://dblp.org}
}

@article{aby3,
  author    = {Payman Mohassel and
               Peter Rindal},
  title     = {{ABY3:} {A} Mixed Protocol Framework for Machine Learning},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {403},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/403},
  timestamp = {Tue, 14 Aug 2018 17:08:27 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/MohasselR18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@article{eric,
  title     = {Electronic Registration Information Center, Inc.},
  year      = {2018},
  url       = {https://www.ericstates.org/},
  timestamp = {Tue, 14 Aug 2018 }
}

@article{threat,
	title     = {Facebook Threat Exchange},
	year      = {2018},
	url       = {https://developers.facebook.com/programs/threatexchange/},
	timestamp = {Tue, 14 Aug 2018}
}
@article{alt_threat,
title     = {AlienVault Open Threat Exchange (OTX)},
year      = {2018},
url       = {https://www.alienvault.com/open-threat-exchange},
timestamp = {Tue, 14 Aug 2018}
}
@article{aws,
title     = {Amazon Web Services},
year      = {2018},
url       = {https://aws.amazon.com/},
timestamp = {Tue, 14 Aug 2018}
}

@article{aws_pricing,
	author = "Hasham",
	title     = {AWS data transfer costs and how to minimize them},
	year      = {2017},
	url       = {https://datapath.io/resources/blog/what-are-aws-data-transfer-costs-and-how-to-minimize-them/},
	timestamp = {Tue, 14 Aug 2018}
}

@article {DRRT18,
	author = "Daniel Demmler and Peter Rindal and Mike Rosulek and Ni Trieu",
	title = "PIR-PSI: Scaling Private Contact Discovery",
	journal = "Proceedings on Privacy Enhancing Technologies",
	year = "2018",
	volume = "2018",
	number = "4",
	pages:      159 - 178",
	url = "https://content.sciendo.com/view/journals/popets/2018/4/article-p159.xml"
}
@inproceedings{DBLP:conf/crypto/ChidaGHIKLN18,
  author    = {Koji Chida and
               Daniel Genkin and
               Koki Hamada and
               Dai Ikarashi and
               Ryo Kikuchi and
               Yehuda Lindell and
               Ariel Nof},
  editor    = {Hovav Shacham and
               Alexandra Boldyreva},
  title     = {Fast Large-Scale Honest-Majority {MPC} for Malicious Adversaries},
  booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
               Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10993},
  pages     = {34--64},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-96878-0\_2},
  doi       = {10.1007/978-3-319-96878-0\_2},
  timestamp = {Mon, 13 Aug 2018 14:06:20 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/crypto/ChidaGHIKLN18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{MS13,
  author    = {Payman Mohassel and
               Seyed Saeed Sadeghian},
  editor    = {Thomas Johansson and
               Phong Q. Nguyen},
  title     = {How to Hide Circuits in {MPC} an Efficient Framework for Private Function
               Evaluation},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Athens, Greece, May 26-30, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7881},
  pages     = {557--574},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38348-9\_33},
  doi       = {10.1007/978-3-642-38348-9\_33},
  timestamp = {Tue, 26 Jun 2018 14:10:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/MohasselS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@inproceedings{mal_high_throughput,
	author    = {Jun Furukawa and
	Yehuda Lindell and
	Ariel Nof and
	Or Weinstein},
	editor    = {Jean{-}S{\'{e}}bastien Coron and
	Jesper Buus Nielsen},
	title     = {High-Throughput Secure Three-Party Computation for Malicious Adversaries
	and an Honest Majority},
	booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
	Conference on the Theory and Applications of Cryptographic Techniques,
	Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}},
	series    = {Lecture Notes in Computer Science},
	volume    = {10211},
	pages     = {225--255},
	year      = {2017},
	url       = {https://doi.org/10.1007/978-3-319-56614-6_8},
	doi       = {10.1007/978-3-319-56614-6_8},
	timestamp = {Sat, 16 Sep 2017 12:12:20 +0200},
	biburl    = {http://dblp.org/rec/bib/conf/eurocrypt/FurukawaLNW17},
	bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{highthroughput,
	author    = {Toshinori Araki and
	Jun Furukawa and
	Yehuda Lindell and
	Ariel Nof and
	Kazuma Ohara},
	editor    = {Edgar R. Weippl and
	Stefan Katzenbeisser and
	Christopher Kruegel and
	Andrew C. Myers and
	Shai Halevi},
	title     = {High-Throughput Semi-Honest Secure Three-Party Computation with an
	Honest Majority},
	booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
	Communications Security, Vienna, Austria, October 24-28, 2016},
	pages     = {805--817},
	publisher = {{ACM}},
	year      = {2016},
	url       = {http://doi.acm.org/10.1145/2976749.2978331},
	doi       = {10.1145/2976749.2978331},
	timestamp = {Mon, 24 Oct 2016 18:57:12 +0200},
	biburl    = {http://dblp.org/rec/bib/conf/ccs/ArakiFLNO16},
	bibsource = {dblp computer science bibliography, http://dblp.org}
}

@inproceedings{LWZ11,
  author    = {Sven Laur and
               Jan Willemson and
               Bingsheng Zhang},
  editor    = {Xuejia Lai and
               Jianying Zhou and
               Hui Li},
  title     = {Round-Efficient Oblivious Database Manipulation},
  booktitle = {Information Security, 14th International Conference, {ISC} 2011, Xi'an,
               China, October 26-29, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7001},
  pages     = {262--277},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-24861-0\_18},
  doi       = {10.1007/978-3-642-24861-0\_18},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/isw/LaurWZ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}

@inproceedings{HEK12,
	author    = {Yan Huang and
	David Evans and
	Jonathan Katz},
	title     = {Private Set Intersection: Are Garbled Circuits Better than Custom
	Protocols?},
	booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS}
	2012, San Diego, California, USA, February 5-8, 2012},
	publisher = {The Internet Society},
	year      = {2012},
	url       = {https://www.ndss-symposium.org/ndss2012/private-set-intersection-are-garbled-circuits-better-custom-protocols},
	timestamp = {Tue, 13 Mar 2018 15:08:56 +0100},
	biburl    = {https://dblp.org/rec/bib/conf/ndss/HuangEK12},
	bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{KS06,
	author    = {Lea Kissner and
	Dawn Xiaodong Song},
	editor    = {Victor Shoup},
	title     = {Privacy-Preserving Set Operations},
	booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
	Cryptology Conference, Santa Barbara, California, USA, August 14-18,
	2005, Proceedings},
	series    = {Lecture Notes in Computer Science},
	volume    = {3621},
	pages     = {241--257},
	publisher = {Springer},
	year      = {2005},
	url       = {https://doi.org/10.1007/11535218\_15},
	doi       = {10.1007/11535218\_15},
	timestamp = {Tue, 30 May 2017 16:36:53 +0200},
	biburl    = {https://dblp.org/rec/bib/conf/crypto/KissnerS05},
	bibsource = {dblp computer science bibliography, https://dblp.org}
}

@inproceedings{MF06,
	author    = {Payman Mohassel and
	Matthew K. Franklin},
	editor    = {Moti Yung and
	Yevgeniy Dodis and
	Aggelos Kiayias and
	Tal Malkin},
	title     = {Efficient Polynomial Operations in the Shared-Coefficients Setting},
	booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference
	on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
	April 24-26, 2006, Proceedings},
	series    = {Lecture Notes in Computer Science},
	volume    = {3958},
	pages     = {44--57},
	publisher = {Springer},
	year      = {2006},
	url       = {https://doi.org/10.1007/11745853\_4},
	doi       = {10.1007/11745853\_4},
	timestamp = {Tue, 26 Jun 2018 14:11:54 +0200},
	biburl    = {https://dblp.org/rec/bib/conf/pkc/MohasselF06},
	bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{NP99,
	author    = {Moni Naor and
	Benny Pinkas},
	editor    = {Jeffrey Scott Vitter and
	Lawrence L. Larmore and
	Frank Thomson Leighton},
	title     = {Oblivious Transfer and Polynomial Evaluation},
	booktitle = {Proceedings of the Thirty-First Annual {ACM} Symposium on Theory of
	Computing, May 1-4, 1999, Atlanta, Georgia, {USA}},
	pages     = {245--254},
	publisher = {{ACM}},
	year      = {1999},
	url       = {http://doi.acm.org/10.1145/301250.301312},
	doi       = {10.1145/301250.301312},
	timestamp = {Thu, 16 Feb 2012 12:06:35 +0100},
	biburl    = {https://dblp.org/rec/bib/conf/stoc/NaorP99},
	bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{LTW13,
 author = {Laur, Sven and Talviste, Riivo and Willemson, Jan},
 title = {From Oblivious AES to Efficient and Secure Database Join in the Multiparty Setting},
 booktitle = {Proceedings of the 11th International Conference on Applied Cryptography and Network Security},
 series = {ACNS'13},
 year = {2013},
 isbn = {978-3-642-38979-5},
 location = {Banff, AB, Canada},
 pages = {84--101},
 numpages = {18},
 url = {http://dx.doi.org/10.1007/978-3-642-38980-1_6},
 doi = {10.1007/978-3-642-38980-1_6},
 acmid = {2524531},
 publisher = {Springer-Verlag},
 address = {Berlin, Heidelberg},
} 
@misc{cryptoeprint:2017:738,
	author = {Mihaela Ion and Ben Kreuter and Erhan Nergiz and Sarvar Patel and Shobhit Saxena and Karn Seth and David Shanahan and Moti Yung},
	title = {Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions},
	howpublished = {Cryptology ePrint Archive, Report 2017/738},
	year = {2017},
	note = {\url{https://eprint.iacr.org/2017/738}},
}
@inproceedings{DBLP:conf/cans/CristofaroGT12,
	author    = {Emiliano De Cristofaro and
	Paolo Gasti and
	Gene Tsudik},
	editor    = {Josef Pieprzyk and
	Ahmad{-}Reza Sadeghi and
	Mark Manulis},
	title     = {Fast and Private Computation of Cardinality of Set Intersection and
	Union},
	booktitle = {Cryptology and Network Security, 11th International Conference, {CANS}
	2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
	volume    = {7712},
	pages     = {218--231},
	publisher = {Springer},
	year      = {2012},
	url       = {https://doi.org/10.1007/978-3-642-35404-5\_17},
	doi       = {10.1007/978-3-642-35404-5\_17},
	timestamp = {Wed, 24 May 2017 08:27:41 +0200},
	biburl    = {https://dblp.org/rec/bib/conf/cans/CristofaroGT12},
	bibsource = {dblp computer science bibliography, https://dblp.org}
}


@inproceedings{PSWW18,
	author    = {Benny Pinkas and
	Thomas Schneider and
	Christian Weinert and
	Udi Wieder},
	editor    = {Jesper Buus Nielsen and
	Vincent Rijmen},
	title     = {Efficient Circuit-Based {PSI} via Cuckoo Hashing},
	booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
	Conference on the Theory and Applications of Cryptographic Techniques,
	Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
	series    = {Lecture Notes in Computer Science},
	volume    = {10822},
	pages     = {125--157},
	publisher = {Springer},
	year      = {2018},
	url       = {https://doi.org/10.1007/978-3-319-78372-7\_5},
	doi       = {10.1007/978-3-319-78372-7\_5},
	timestamp = {Mon, 16 Apr 2018 14:15:36 +0200},
	biburl    = {https://dblp.org/rec/bib/conf/eurocrypt/Pinkas0WW18},
	bibsource = {dblp computer science bibliography, https://dblp.org}
}

@InProceedings{RSA:HMRT12,
	author="Hazay, Carmit
	and Mikkelsen, Gert L{\ae}ss{\o}e
	and Rabin, Tal
	and Toft, Tomas",
	editor="Dunkelman, Orr",
	title="Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting",
	booktitle="Topics in Cryptology -- CT-RSA 2012",
	year="2012",
	publisher="Springer Berlin Heidelberg",
	address="Berlin, Heidelberg",
	pages="313--331",
	abstract="The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first non-generic fully simulatable protocol for distributively generating an RSA composite with security against malicious behavior in the two party setting. Our second contribution is a complete Paillier [37] threshold encryption scheme in the two-party setting with security against malicious behavior. Our RSA key generation is comprised of the following: (i) a distributed protocol for generation of an RSA composite, and (ii) a biprimality test for verifying the validity of the generated composite. Our Paillier threshold encryption scheme uses the RSA composite as public key and is comprised of: (i) a distributed generation of the corresponding secret-key shares and, (ii) a distributed decryption protocol for decrypting according to Paillier.",
	isbn="978-3-642-27954-6"
}

@article{PETS:Henry16,
	author    = {Ryan Henry},
	title     = {Polynomial Batch Codes for Efficient {IT-PIR}},
	journal   = {PoPETs},
	volume    = {2016},
	number    = {4},
	pages     = {202--218},
	year      = {2016},
	url       = {https://doi.org/10.1515/popets-2016-0036},
	doi       = {10.1515/popets-2016-0036},
	timestamp = {Sat, 27 May 2017 14:24:30 +0200},
	biburl    = {https://dblp.org/rec/bib/journals/popets/Henry16},
	bibsource = {dblp computer science bibliography, https://dblp.org}
}

@inproceedings{U:DevGolHen12,
	author = {Devet, Casey and Goldberg, Ian and Heninger, Nadia},
	title = {Optimally Robust Private Information Retrieval},
	booktitle = {Proceedings of the 21st USENIX Conference on Security Symposium},
	series = {Security'12},
	year = {2012},
	location = {Bellevue, WA},
	pages = {13--13},
	numpages = {1},
	url = {http://dl.acm.org/citation.cfm?id=2362793.2362806},
	acmid = {2362806},
	publisher = {USENIX Association},
	address = {Berkeley, CA, USA},
}

@article{FOCS:CKGS98,
	author = {Chor, Benny and Kushilevitz, Eyal and Goldreich, Oded and Sudan, Madhu},
	title = {Private Information Retrieval},
	journal = {J. ACM},
	issue_date = {Nov. 1998},
	volume = {45},
	number = {6},
	month = nov,
	year = {1998},
	issn = {0004-5411},
	pages = {965--981},
	numpages = {17},
	doi = {10.1145/293347.293350},
	acmid = {293350},
	publisher = {ACM},
	address = {New York, NY, USA},
}


@inproceedings{AS16,
	title={Unobservable Communication over Fully Untrusted Infrastructure},
	author={Angel, Sebastian and Setty, Srinath},
	booktitle={OSDI},
	pages={551--569},
	year={2016}
}

@inproceedings{ACLS17,
	author = {Sebastian Angel and Hao Chen and Kim Laine and Srinath Setty},
	title = {{PIR} with compressed queries and amortized query processing},
		booktitle = {Proceedings of the 2018 IEEE Symposium on Security and Privacy},
		series = {SP '18},
		year = {2018},	
		publisher = {IEEE Computer Society},
	}



@article{gilad2016secure,
	title={Secure Data Exchange: A Marketplace in the Cloud},
	author={Gilad-Bachrach, Ran and Laine, Kim and Lauter, Kristin and Rindal, Peter and Rosulek, Mike},
	howpublished = {Cryptology ePrint Archive, Report 2016/620},
	year={2016}
}
@inproceedings {xxxx,
	author = {Casey Devet and Ian Goldberg and Nadia Heninger},
	title = {Optimally Robust Private Information Retrieval},
	booktitle = {Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security 12)},
	year = {2012},
	isbn = {978-931971-95-9},
	address = {Bellevue, WA},
	pages = {269--283},
	url = {https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/devet},
	publisher = {{USENIX}},
}
@article{Hen16,
	author    = {Ryan Henry},
	title     = {Polynomial Batch Codes for Efficient {IT-PIR}},
	journal   = {PoPETs},
	volume    = {2016},
	number    = {4},
	pages     = {202--218},
	year      = {2016},
	url       = {https://doi.org/10.1515/popets-2016-0036},
	doi       = {10.1515/popets-2016-0036},
	timestamp = {Sat, 27 May 2017 01:00:00 +0200},
	biburl    = {https://dblp.org/rec/bib/journals/popets/Henry16},
	bibsource = {dblp computer science bibliography, https://dblp.org}
}

@inproceedings{OOS17,
	author="Orr{\`u}, Michele
	and Orsini, Emmanuela
	and Scholl, Peter",
	editor="Handschuh, Helena",
	title="Actively Secure 1-out-of-N OT Extension with Application to Private Set Intersection",
	bookTitle="Topics in Cryptology -- CT-RSA 2017: The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14--17, 2017, Proceedings",
	year="2017",
	publisher="Springer International Publishing",
	address="Cham",
	pages="381--396",
	abstract="This paper describes a 1-out-of-N oblivious transfer (OT) extension protocol with active security, which achieves very low overhead on top of the passively secure protocol of Kolesnikov and Kumaresan (Crypto 2011). Our protocol obtains active security using a consistency check which requires only simple computation and has a communication overhead that is independent of the total number of OTs to be produced. We prove its security in both the random oracle model and the standard model, assuming a variant of correlation robustness. We describe an implementation, which demonstrates our protocol only costs around 5--30{\%} more than the passively secure protocol.",
	isbn="978-3-319-52153-4",
	doi="10.1007/978-3-319-52153-4_22",
}
@inproceedings{HFH99,
 author = {Huberman, Bernardo A. and Franklin, Matt and Hogg, Tad},
 title = {Enhancing Privacy and Trust in Electronic Communities},
 booktitle = {Proceedings of the 1st ACM Conference on Electronic Commerce},
 series = {EC '99},
 year = {1999},
 isbn = {1-58113-176-3},
 location = {Denver, Colorado, USA},
 pages = {78--86},
 numpages = {9},
 url = {http://doi.acm.org/10.1145/336992.337012},
 doi = {10.1145/336992.337012},
 acmid = {337012},
 publisher = {ACM},
 address = {New York, NY, USA},
} 



@misc{libOTe,
	author = {Peter Rindal},
	title = {{libOTe: an efficient, portable, and easy to use Oblivious Transfer Library}},
	howpublished = {\url{https://github.com/osu-crypto/libOTe}},
}


@incollection{frieze2009analysis,
	title={An analysis of random-walk cuckoo hashing},
	author={Frieze, Alan and Melsted, P{\'a}ll and Mitzenmacher, Michael},
	booktitle={Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques},
	pages={490--503},
	year={2009},
	publisher={Springer}
}

@inproceedings{dietzfelbinger2010tight,
	title={Tight thresholds for cuckoo hashing via {XORSAT}},
	author={Dietzfelbinger, Martin and Goerdt, Andreas and Mitzenmacher, Michael and Montanari, Andrea and Pagh, Rasmus and Rink, Michael},
	booktitle={International Colloquium on Automata, Languages, and Programming},
	pages={213--225},
	year={2010},
	organization={Springer}
}


@inproceedings{CCSW:DHS14,
	author = {Demmler, Daniel and Herzberg, Amir and Schneider, Thomas},
	title = {{RAID-PIR}: Practical Multi-Server {PIR}},
	booktitle = {ACM Workshop on Cloud Computing Security},
	series = {CCSW '14},
	year = {2014},
	isbn = {978-1-4503-3239-2},
	location = {Scottsdale, Arizona, USA},
	pages = {45--56},
	numpages = {12},
	doi = {10.1145/2664168.2664181},
	acmid = {2664181},
	publisher = {ACM},
	address = {New York, NY, USA},
	keywords = {applied cryptography, cloud security, privacy enhancing technologies, private information retrieval, raid, redundant array of inexpensive disks, secure storage},
} 


@inproceedings{ESA:KMW08,
	author    = {Adam Kirsch and
	Michael Mitzenmacher and
	Udi Wieder},
	title     = {More Robust Hashing: Cuckoo Hashing with a Stash},
	booktitle = {{ESA} 2008},
	pages     = {611--622},
	year      = {2008},
	crossref  = {DBLP:conf/esa/2008},
	doi       = {10.1007/978-3-540-87744-8_51},
	timestamp = {Wed, 24 Sep 2008 13:26:08 +0200},
	biburl    = {http://dblp2.uni-trier.de/rec/bib/conf/esa/KirschMW08},
	bibsource = {dblp computer science bibliography, http://dblp.org}
}
@inproceedings{NPS99,
 author = {Naor, Moni and Pinkas, Benny and Sumner, Reuban},
 title = {Privacy Preserving Auctions and Mechanism Design},
 booktitle = {1st ACM Conference on Electronic Commerce},
 year = {1999},
 isbn = {1-58113-176-3},
 location = {Denver, Colorado, USA},
 pages = {129--139},
 numpages = {11},
 doi = {10.1145/336992.337028},
 acmid = {337028},
 publisher = {ACM},
 address = {New York, NY, USA},
}
@inproceedings{pagh2001cuckoo,
	title={Cuckoo hashing},
	author={Pagh, Rasmus and Rodler, Flemming Friche},
	booktitle={European Symposium on Algorithms},
	pages={121--133},
	year={2001},
	organization={Springer}
}

@inproceedings{impagliazzo-worlds,
  author    = {Russell Impagliazzo},
  title     = {A Personal View of Average-Case Complexity},
  booktitle = {Tenth Annual Structure in Complexity Theory Conference,
               Minneapolis, Minnesota, USA, June 19-22, 1995},
  year      = {1995},
  pages     = {134--147},
  crossref  = {DBLP:conf/coco/1995},
  doi       = {10.1109/SCT.1995.514853},
  timestamp = {Thu, 25 Sep 2014 20:38:09 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/coco/Impagliazzo95},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/coco/1995,
  title     = {Tenth Annual Structure in Complexity Theory Conference,
               Minneapolis, Minnesota, USA, June 19-22, 1995},
  year      = {1995},
  publisher = {{IEEE} Computer Society},
  isbn      = {0-8186-7052-5},
  timestamp = {Thu, 25 Sep 2014 20:38:09 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/coco/1995},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}


@rfc{HMAC,
 author = {Krawczyk, H. and Bellare, M. and Canetti, R.},
 title = {{HMAC:} Keyed-Hashing for Message Authentication},
 year = {1997},
 publisher = {RFC Editor},
 address = {United States},
}

@misc{vmac,
 author = {Ted Krovetz and Wei Dai},
 title = {{VMAC:} Message Authentication Code using Universal Hashing},
 year = {2007},
 howpublished = {CFRG Working Group},
 note = {\url{http://www.fastcrypto.org/vmac/draft-krovetz-vmac-01.txt}}
}



@inproceedings{DBLP:conf/csfw/MalozemoffKG14,
  author    = {Alex J. Malozemoff and
               Jonathan Katz and
               Matthew D. Green},
  title     = {Automated Analysis and Synthesis of Block-Cipher Modes of Operation},
  booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF}},
  pages     = {140--152},
  year      = {2014},
  crossref  = {DBLP:conf/csfw/2014},
  doi       = {10.1109/CSF.2014.18},
  timestamp = {Tue, 02 Dec 2014 18:01:32 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/csfw/MalozemoffKG14},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/csfw/2014,
  title     = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
               Austria, 19-22 July, 2014},
  publisher = {{IEEE}},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6954678},
  timestamp = {Tue, 02 Dec 2014 17:56:42 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/csfw/2014},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}




@misc{eprint:MPR13,
    author = {Hemanta K. Maji and Manoj Prabhakaran and Mike Rosulek},
    title = {Complexity of Multi-Party Computation Functionalities},
    howpublished = {Cryptology ePrint Archive, Report 2013/042},
    year = {2013},
    note = {\url{http://eprint.iacr.org/}},
}

@incollection{tiwari2015program,
    title={Program synthesis using dual interpretation},
    author={Tiwari, Ashish and Gasc{\'o}n, Adria and Dutertre, Bruno},
    booktitle={Automated Deduction-CADE-25},
    pages={482--497},
    year={2015},
    publisher={Springer}
}

@misc{vamonos,
    author = {Brent Carmer and Mike Rosulek},
    title = {Vamonos: Dynamic algorithm visualization in the browser},
    note = {\url{http://rosulek.github.io/vamonos/}}
}


@misc{br-notes,
    author = {Mihir Bellare and Philip Rogaway},
    title = {Introduction to Modern Cryptography},
    note = {Online lecture notes. \url{https://cseweb.ucsd.edu/~mihir/cse207/classnotes.html}}
}

@misc{ps-notes,
    author = {Rafael Pass and {abhi} {shelat}},
    title = {A Course in Cryptography},
    note = {Online lecture notes. \url{https://www.cs.cornell.edu/courses/cs4830/2010fa/lecnotes.pdf}}
}

@misc{bs-notes,
    author = {Dan Boneh and Victor Shoup},
    title = {A Graduate Course in Applied Cryptography},
    note = {Online lecture notes. \url{https://crypto.stanford.edu/~dabo/cryptobook/}}
}

@book{katz-lindell,
 author = {Katz, Jonathan and Lindell, Yehuda},
 title = {Introduction to Modern Cryptography (Chapman \& Hall/Crc Cryptography and Network Security Series)},
 year = {2007},
 isbn = {1584885513},
 publisher = {Chapman \& Hall/CRC},
}



@inproceedings{DBLP:conf/innovations/ApplebaumAB15,
  author    = {Benny Applebaum and
               Jonathan Avron and
               Christina Brzuska},
  title     = {Arithmetic Cryptography: Extended Abstract},
  booktitle = {2015 Conference on Innovations in Theoretical Computer
               Science, {ITCS} 2015, Rehovot, Israel, January 11-13, 2015},
  pages     = {143--151},
  year      = {2015},
  crossref  = {DBLP:conf/innovations/2015},
  doi       = {10.1145/2688073.2688114},
  timestamp = {Sun, 25 Jan 2015 11:31:05 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/innovations/ApplebaumAB15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/innovations/2015,
  editor    = {Tim Roughgarden},
  title     = {2015 Conference on Innovations in Theoretical Computer
               Science, {ITCS} 2015, Rehovot, Israel, January 11-13, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2688073},
  isbn      = {978-1-4503-3333-7},
  timestamp = {Sun, 25 Jan 2015 11:29:31 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/innovations/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}




@inproceedings{DBLP:conf/ccs/GueronLNP15,
  author    = {Shay Gueron and
               Yehuda Lindell and
               Ariel Nof and
               Benny Pinkas},
  title     = {Fast Garbling of Circuits Under Standard Assumptions},
  booktitle = {22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-6, 2015},
  pages     = {567--578},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015},
  doi       = {10.1145/2810103.2813619},
  timestamp = {Sat, 03 Oct 2015 20:14:37 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/GueronLNP15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}



@inproceedings{DBLP:conf/cade/TiwariGD15,
  author    = {Ashish Tiwari and
               Adria Gasc{\'{o}}n and
               Bruno Dutertre},
  title     = {Program Synthesis Using Dual Interpretation},
  booktitle = {Automated Deduction - {CADE-25} - 25th International Conference on
               Automated Deduction, Berlin, Germany, August 1-7, 2015, Proceedings},
  pages     = {482--497},
  year      = {2015},
  crossref  = {DBLP:conf/cade/2015},
  doi       = {10.1007/978-3-319-21401-6_33},
  timestamp = {Fri, 31 Jul 2015 13:18:27 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/cade/TiwariGD15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/cade/2015,
  editor    = {Amy P. Felty and
               Aart Middeldorp},
  title     = {Automated Deduction - {CADE-25} - 25th International Conference on
               Automated Deduction, Berlin, Germany, August 1-7, 2015, Proceedings},
  series    = {LNCS},
  volume    = {9195},
  publisher = {Springer},
  year      = {2015},
  doi       = {10.1007/978-3-319-21401-6},
  isbn      = {978-3-319-21400-9},
  timestamp = {Fri, 31 Jul 2015 13:15:07 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/cade/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}




@inproceedings{DBLP:conf/ccs/MohasselRZ15,
  author    = {Payman Mohassel and
               Mike Rosulek and
               Ye Zhang},
  title     = {Fast and Secure Three-party Computation: The Garbled Circuit Approach},
  booktitle = {22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-6, 2015},
  pages     = {591--602},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015},
  doi       = {10.1145/2810103.2813705},
  timestamp = {Sat, 03 Oct 2015 20:14:37 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/MohasselRZ15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}


@article{PPBsig,
    author = {Geovandro C.C.F. Pereira and Cassius Puodzius and Paulo S.L.M. Barreto},
    title = {Shorter hash-based signatures},
    journal = {Journal of Systems and Software},
    publisher = {Elsevier},
    year = {2015}
}

@misc{lamport,
    author = {Leslie Lamport},
    title = {Constructing Digital Signatures from a One-Way Function},
    howpublished = {Technical Report SRI-CSL-98, SRI International Computer Science Laboratory},
    year = {1979}
}

@inproceedings{DBLP:conf/africacrypt/Hulsing13,
  author    = {Andreas H{\"{u}}lsing},
  title     = {{W-OTS+} - Shorter Signatures for Hash-Based Signature Schemes},
  booktitle = {Progress in Cryptology - {AFRICACRYPT}},
  pages     = {173--188},
  year      = {2013},
  crossref  = {DBLP:conf/africacrypt/2013},
  doi       = {10.1007/978-3-642-38553-7_10},
  timestamp = {Tue, 28 May 2013 10:14:22 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/africacrypt/Hulsing13},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/africacrypt/2013,
  editor    = {Amr Youssef and
               Abderrahmane Nitaj and
               Aboul Ella Hassanien},
  title     = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference
               on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings},
  series    = {LNCS},
  volume    = {7918},
  publisher = {Springer},
  year      = {2013},
  doi       = {10.1007/978-3-642-38553-7},
  isbn      = {978-3-642-38552-0},
  timestamp = {Tue, 28 May 2013 10:12:58 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/africacrypt/2013},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}






@inproceedings{DBLP:conf/ima/Maurer05,
  author    = {Ueli M. Maurer},
  title     = {Abstract Models of Computation in Cryptography},
  booktitle = {Cryptography and Coding, 10th {IMA} International Conference},
  pages     = {1--12},
  year      = {2005},
  crossref  = {DBLP:conf/ima/2005},
  doi       = {10.1007/11586821_1},
  timestamp = {Tue, 08 Nov 2005 08:44:07 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ima/Maurer05},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ima/2005,
  editor    = {Nigel P. Smart},
  title     = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
               UK, December 19-21, 2005, Proceedings},
  series    = {LNCS},
  volume    = {3796},
  publisher = {Springer},
  year      = {2005},
  isbn      = {3-540-30276-X},
  timestamp = {Tue, 08 Nov 2005 08:44:07 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ima/2005},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}




@inproceedings{DBLP:conf/fps/GagneLLS11,
  author    = {Martin Gagn{\'{e}} and
               Pascal Lafourcade and
               Yassine Lakhnech and
               Reihaneh Safavi{-}Naini},
  title     = {Automated Verification of Block Cipher Modes of Operation, an Improved
               Method},
  booktitle = {Foundations and Practice of Security},
  pages     = {23--31},
  year      = {2011},
  crossref  = {DBLP:conf/fps/2011},
  doi       = {10.1007/978-3-642-27901-0_3},
  timestamp = {Mon, 23 Jan 2012 19:17:56 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fps/GagneLLS11},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fps/2011,
  editor    = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Pascal Lafourcade},
  title     = {Foundations and Practice of Security - 4th Canada-France {MITACS}
               Workshop, {FPS} 2011, Paris, France, May 12-13, 2011, Revised Selected
               Papers},
  series    = {LNCS},
  volume    = {6888},
  publisher = {Springer},
  year      = {2012},
  doi       = {10.1007/978-3-642-27901-0},
  isbn      = {978-3-642-27900-3},
  timestamp = {Mon, 23 Jan 2012 19:15:47 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fps/2011},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}




@inproceedings{DBLP:conf/asian/GagneLLS09,
  author    = {Martin Gagn{\'{e}} and
               Pascal Lafourcade and
               Yassine Lakhnech and
               Reihaneh Safavi{-}Naini},
  title     = {Automated Security Proof for Symmetric Encryption Modes},
  booktitle = {Advances in Computer Science - {ASIAN} 2009},
  pages     = {39--53},
  year      = {2009},
  crossref  = {DBLP:conf/asian/2009},
  doi       = {10.1007/978-3-642-10622-4_4},
  timestamp = {Tue, 14 Sep 2010 09:16:16 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asian/GagneLLS09},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/asian/2009,
  editor    = {Anupam Datta},
  title     = {Advances in Computer Science - {ASIAN} 2009.},
  series    = {LNCS},
  volume    = {5913},
  publisher = {Springer},
  year      = {2009},
  doi       = {10.1007/978-3-642-10622-4},
  isbn      = {978-3-642-10621-7},
  timestamp = {Tue, 14 Sep 2010 09:13:44 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/asian/2009},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}



@inproceedings{DBLP:conf/ccs/CourantDELL08,
  author    = {Judica{\"{e}}l Courant and
               Marion Daubignard and
               Cristian Ene and
               Pascal Lafourcade and
               Yassine Lakhnech},
  title     = {Towards automated proofs for asymmetric encryption schemes in the
               random oracle model},
  booktitle = {2008 {ACM} Conference on Computer and Communications
               Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages     = {371--380},
  year      = {2008},
  crossref  = {DBLP:conf/ccs/2008},
  doi       = {10.1145/1455770.1455817},
  timestamp = {Tue, 11 Nov 2008 10:40:33 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/CourantDELL08},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008,
  editor    = {Peng Ning and
               Paul F. Syverson and
               Somesh Jha},
  title     = {2008 {ACM} Conference on Computer and Communications
               Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-59593-810-7},
  timestamp = {Tue, 11 Nov 2008 10:39:24 +0100},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2008},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}




@inproceedings{DBLP:conf/ccs/HoangKM15,
  author    = {Viet Tung Hoang and
               Jonathan Katz and
               Alex J. Malozemoff},
  title     = {Automated Analysis and Synthesis of Authenticated Encryption Schemes},
  booktitle = {22nd {ACM} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-6, 2015},
  pages     = {84--95},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015},
  doi       = {10.1145/2810103.2813636},
  timestamp = {Sat, 03 Oct 2015 20:14:37 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/HoangKM15},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}


@proceedings{DBLP:conf/ccs/2015,
  editor    = {Indrajit Ray and
               Ninghui Li and
               Christopher Kruegel},
  title     = {22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-6, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2810103},
  isbn      = {978-1-4503-3832-5},
  timestamp = {Sat, 03 Oct 2015 19:54:04 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/ccs/2015},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}





@inproceedings{DBLP:conf/fse/FleischmannFL12,
  author    = {Ewan Fleischmann and
               Christian Forler and
               Stefan Lucks},
  title     = {McOE: {A} Family of Almost Foolproof On-Line Authenticated Encryption
               Schemes},
  booktitle = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
               Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  pages     = {196--215},
  year      = {2012},
  crossref  = {DBLP:conf/fse/2012},
  doi       = {10.1007/978-3-642-34047-5_12},
  timestamp = {Tue, 11 Sep 2012 15:45:39 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/FleischmannFL12},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}
@proceedings{DBLP:conf/fse/2012,
  editor    = {Anne Canteaut},
  title     = {Fast Software Encryption - 19th International Workshop, {FSE} 2012,
               Washington, DC, USA, March 19-21, 2012. Revised Selected Papers},
  series    = {LNCS},
  volume    = {7549},
  publisher = {Springer},
  year      = {2012},
  doi       = {10.1007/978-3-642-34047-5},
  isbn      = {978-3-642-34046-8},
  timestamp = {Tue, 11 Sep 2012 15:35:40 +0200},
  biburl    = {http://dblp.uni-trier.de/rec/bib/conf/fse/2012},
  bibsource = {dblp computer science bibliography, http://dblp.org}
}



@misc{cryptoeprint:2015:1049,
    author = {Thomas Peyrin and Yannick Seurin},
    title = {Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers},
    howpublished = {Cryptology ePrint Archive, Report 2015/1049},
    year = {2015},
    note = {\href{http://ia.cr/2015/1049}{ia.cr/2015/1049}},
}


@misc{scbib,
    author = {Mike Rosulek},
    title = {An Annotated Bibliography of Practical Secure Computation},
    note = {\url{http://web.engr.oregonstate.edu/~rosulekm/scbib}}
}

@incollection{kolesnikov2008improved,
    title={Improved garbled circuit: Free XOR gates and applications},
    author={Kolesnikov, Vladimir and Schneider, Thomas},
    booktitle={Automata, Languages and Programming},
    pages={486--498},
    year={2008},
    publisher={Springer}
}


@unpublished{MPS16,
 author ={Tal Malkin and Valerio Pastro and {abhi} {shelat}},
 title ={An Algebraic Approach to Garbling},
 year = 2016,
 note = {Unpublished manuscript. Presented at Simons Institute workshop on securing computation: \url{https://simons.berkeley.edu/talks/tal-malkin-2015-06-10}}
}


@misc{moxie,
    author = {Moxie Marlinspike},
    title = {The Difficulty Of Private Contact Discovery},
    howpublished = {Whisper Systems blog post},
    note = {\url{https://whispersystems.org/blog/contact-discovery/}},
    year = {2014}
}

@misc{signaldiscovery,
    author = {Moxie Marlinspike},
    title = {Technology preview: Private contact discovery for Signal},
    howpublished = {Signal blog post},
    note = {\url{https://signal.org/blog/private-contact-discovery/}},
    year = {2017}
}

@misc{pew,
    author = {Aaron Smith},
    title = {6 new facts about Facebook},
    howpublished = {Pew Research Center Fact Tank},
    note = {\url{http://www.pewresearch.org/fact-tank/2014/02/03/6-new-facts-about-facebook/}},
    year = {2014}
}

@misc{whatsapp,
    author = {{Huffington Post}},
    title = {{Nach Gerichtsurteil: WhatsApp-Nutzern k{\"o}nnen Abmahnkosten drohen (German)}},
    note = {\url{http://www.huffingtonpost.de/2017/06/27/whatsapp-abmahnung-anwalt-medien-gericht-nutzer_n_17302734.html}},
    year = {2017}
}

@inproceedings{PSZ14,
        author = {Pinkas, Benny and Schneider, Thomas and Zohner, Michael},
        title = {Faster Private Set Intersection Based on {OT} Extension},
        booktitle = {{USENIX} Security 14},
        series = {SEC'14},
        year = {2014},
        isbn = {978-1-931971-15-7},
        location = {San Diego, CA},
        pages = {797--812},
        numpages = {16},
        acmid = {2671276},
        publisher = {USENIX Association},
        address = {Berkeley, CA, USA},
}


@misc{PSZ16,
    author = {Benny Pinkas and Thomas Schneider and Michael Zohner},
    title = {Scalable Private Set Intersection Based on {OT} Extension},
    howpublished = {Cryptology ePrint Archive, Report 2016/930},
    year = {2016},
    note = {\url{http://eprint.iacr.org/2016/930}},
}

@InProceedings{CLR17,
  author    = {Hao Chen and
Kim Laine and
Peter Rindal},
editor    = {Bhavani M. Thuraisingham and
David Evans and
Tal Malkin and
Dongyan Xu},
title     = {Fast Private Set Intersection from Homomorphic Encryption},
booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
November 03, 2017},
pages     = {1243--1255},
publisher = {{ACM}},
year      = {2017},
url       = {http://doi.acm.org/10.1145/3133956.3134061},
doi       = {10.1145/3133956.3134061},
timestamp = {Tue, 13 Mar 2018 15:08:56 +0100},
biburl    = {https://dblp.org/rec/bib/conf/ccs/ChenLR17},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@InProceedings{CHLR18,
	author    = {Hao Chen and
	Zhicong Huang and
	Kim Laine and
	Peter Rindal},
	title     = {Labeled PSI from Fully Homomorphic Encryption with Malicious Security},
	booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
	Communications Security, {CCS} 2018, Toronto, Canada, October 14 -
	16, 2018},
	publisher = {{ACM}},
	year      = {2018}
}

@inproceedings{KMPRT17,
	author    = {Vladimir Kolesnikov and
	Naor Matania and
	Benny Pinkas and
	Mike Rosulek and
	Ni Trieu},
	editor    = {Bhavani M. Thuraisingham and
	David Evans and
	Tal Malkin and
	Dongyan Xu},
	title     = {Practical Multi-party Private Set Intersection from Symmetric-Key
	Techniques},
	booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
	Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
	November 03, 2017},
	pages     = {1257--1272},
	publisher = {{ACM}},
	year      = {2017},
	url       = {http://doi.acm.org/10.1145/3133956.3134065},
	doi       = {10.1145/3133956.3134065},
	timestamp = {Tue, 13 Mar 2018 15:08:56 +0100},
	biburl    = {https://dblp.org/rec/bib/conf/ccs/KolesnikovMPRT17},
	bibsource = {dblp computer science bibliography, https://dblp.org}
}

@inproceedings{RA17,
    author = {Amanda Cristina Davi Resende and Diego F. Aranha},
    title = {Faster Unbalanced Private Set Intersection},
    booktitle = fc18name,
    series    = mylncs,
    publisher = fcpub,
    volume = fc18vol,
    year = {2018},
}


@article{CCLLRX17,
	author    = {Gizem S. Cetin and
	Hao Chen and
	Kim Laine and
	Kristin E. Lauter and
	Peter Rindal and
	Yuhou Xia},
	title     = {Private Queries on Encrypted Genomic Data},
	journal   = {{IACR} Cryptology ePrint Archive},
	volume    = {2017},
	pages     = {207},
	year      = {2017},
	url       = {http://eprint.iacr.org/2017/207},
	timestamp = {Thu, 08 Jun 2017 14:26:37 +0200},
	biburl    = {http://dblp.org/rec/bib/journals/iacr/CetinCLLRX17},
	bibsource = {dblp computer science bibliography, http://dblp.org}
}

@inproceedings{cuckoofilter,
 author = {Fan, Bin and Andersen, Dave G. and Kaminsky, Michael and Mitzenmacher, Michael D.},
 title = {Cuckoo Filter: Practically Better Than Bloom},
 booktitle = {Conference on Emerging Networking Experiments and Technologies},
 series = {CoNEXT'14},
 year = {2014},
 pages = {75--88},
 numpages = {14},
 publisher = {ACM},
 keywords = {bloom filters, compression, cuckoo hashing},
}

@mastersthesis{Lambaek16,
    author = {Mikkel Lamb{\ae}k},
    title = {Breaking and Fixing Private Set Intersection Protocols},
    school = {Aarhus University},
    year = {2016},
    note = {\url{https://eprint.iacr.org/2016/665}}
}

@misc{spectre-sgx,
    author = {{Large-Scale Data \& Systems (LSDS) Group, Imperial College, London}},
    title = {spectre-attack-sgx},
    howpublished = {Github Repository},
    note = {\url{https://github.com/lsds/spectre-attack-sgx}},
    year = {2017}
}


@article{KLSAP17,
  author    = {{\'{A}}gnes Kiss and
               Jian Liu and
               Thomas Schneider and
               N. Asokan and
               Benny Pinkas},
  title     = {Private Set Intersection for Unequal Set Sizes with Mobile Applications},
  journal   = {PoPETs},
  volume    = {2017},
  number    = {4},
  pages     = {177--197},
  year      = {2017},
  doi       = {10.1515/popets-2017-0044},
  timestamp = {Wed, 24 Jan 2018 11:43:26 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/popets/KissL0AP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}


@article {XPIRPETS,
      author = "Carlos Aguilar-Melchor and Joris Barrier and Laurent Fousse and Marc-Olivier Killijian",
      title = "XPIR : Private Information Retrieval for Everyone",
      journal = "PoPETs",
      year = "2016",
      volume = "2016",
      number = "2",
      pages = "155 - 174",
}
