# Computing over Distributed Sensitive Data: Publications

Better Secret-Sharing via Robust Conditional Disclosure of Secrets.” In 52nd ACM Symposium on Theory of Computing (To appear - STOC 2020). ePrint VersionAbstract ePrint-Jan 2020.pdf ePrint-May 2020.pdf

. 6/2020. “The Power of Synergy in Differential Privacy: Combining a Small Curator with Local Randomizers.” In Information-Theoretic Cryptography (To appear - ITC 2020). ArXiv VersionAbstract ARXIV 2019.pdf

. 6/2020. “Separating Local & Shuffled Differential Privacy via Histograms.” In Information-Theoretic Cryptography (To appear - ITC 2020). ArXiv VersionAbstract ARXIV 2019.pdf

. 4/2020. “A Calculus for Flow-Limited Authorization.” Journal of Computer Security.Abstract JCS 2020 Submitted.pdf CSF 2016.pdf

. 2020. “Exploring Differential Obliviousness.” In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, APPROX/RANDOM 10/2019. Publisher's VersionAbstract RANDOM 2019 PDF ARXIV 2019.pdf

. 10/2019. “Relational Symbolic Execution.” In 21st International Symposium on Principles and Practice of Declarative Programming (PPDP 2019). Publisher's VersionAbstract PPDP 2019.pdf

. 10/2019. “Differential Privacy on Finite Computers.” Journal of Privacy and Confidentiality, 9, 2. JPC PageAbstract JPC 2019 ITCS 2018 ArXiv

. 9/2019. “The Privacy Blanket of the Shuffle Model.” In International Cryptology Conference (CRYPTO 2019). Publisher's VersionAbstract ARXIV 2019 .pdf

. 6/2/2019. “Information Flow Control for Distributed Trusted Execution Environments.” In Computer Security Foundations. Publisher's VersionAbstract CSF 2019

. 6/2019. “Secret-Sharing Schemes for General and Uniform Access Structures.” In Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT 2019). Springer VersionAbstract EPRINT 2019.pdf

. 5/2019. “Concentration Bounds for High Sensitivity Functions Through Differential Privacy.” Journal of Privacy and Confidentiality, 9, 1. Publisher's VersionAbstract JPC.PDF

. 3/2019. “Private Center Points and Learning of Halfspaces.” In 32nd Annual Conference on Learning Theory, vol 99: Pp. 1–14. Publisher's VersionAbstract COLT 2019.pdf ARXIV 2019.PDF

. 2/2019. “Clustering Algorithms for the Centralized and Local Models.” Conference on Algorithmic Learning Theory (ALT 2018).

. 4/2018. “Thwarting Adversarial Examples: An L_0-Robust Sparse Fourier Transform.” Advances in Neural Information Processing Systems, 31, Pp. 10096--10106. Publisher's Version PDF

. 2018. “Private Incremental Regression.” in the ACM SIGMOD/PODS Conference (PODS 2017).

. 2017. “Computer-Aided Verification in Mechanism Design.” Conference on Internet and Economics, WINE . PDF

. 12/2016. “Advanced Probabilistic Couplings for Differential Privacy.” 23rd ACM Conference on Computer and Communications Security, CCS. PDF

. 10/2016. “Generic Attacks on Secure Outsourced Databases.” 23rd ACM Conference on Computer and Communications Security.Abstract PDF

. 10/2016. “Differentially Private Bayesian Programming.” 23rd ACM Conference on Computer and Communications Security, CCS. p68-barthe.pdf

. 2016. “