Person:814417: Difference between revisions

From MaRDI portal
Person:814417
Created automatically from import230924090903
 
m AuthorDisambiguator moved page Daniele Micciancio to Daniele Micciancio: Duplicate
 
(No difference)

Latest revision as of 01:23, 13 December 2023

Available identifiers

zbMath Open micciancio.danieleWikidataQ102262518 ScholiaQ102262518MaRDI QIDQ814417

List of research outcomes

PublicationDate of PublicationType
Error correction and ciphertext quantization in lattice cryptography2024-02-06Paper
Efficient FHEW bootstrapping with small evaluation keys, and applications to threshold homomorphic encryption2023-12-12Paper
Large-precision homomorphic sign evaluation using FHEW/TFHE bootstrapping2023-08-16Paper
Securing approximate homomorphic encryption using differential privacy2023-06-12Paper
Simpler statistically sender private oblivious transfer from ideals of cyclotomic integers2023-03-21Paper
Homomorphic Encryption Standard2022-11-02Paper
Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography2022-10-13Paper
On the security of homomorphic encryption on approximate numbers2021-12-08Paper
Homomorphic encryption for finite automata2020-05-05Paper
Building an efficient lattice gadget toolkit: Subgaussian sampling and more2020-02-06Paper
Symbolic encryption with pseudorandom keys2020-02-04Paper
Algorithms for the Densest Sub-Lattice Problem2019-05-15Paper
https://portal.mardi4nfdi.de/entity/Q46124772019-01-31Paper
Asymptotically efficient lattice-based digital signatures2018-09-14Paper
On the bit security of cryptographic primitives2018-07-09Paper
Faster Gaussian sampling for trapdoor lattices with arbitrary modulus2018-07-09Paper
Equational security proofs of oblivious transfer protocols2018-05-16Paper
Gaussian sampling over the integers: efficient, generic, constant-time2017-11-15Paper
Fast Lattice Point Enumeration with Minimal Overhead2017-10-05Paper
An equational approach to secure multi-party computation2017-05-16Paper
A linear space algorithm for computing the hermite normal form2017-02-03Paper
Compactness vs Collusion Resistance in Functional Encryption2016-12-22Paper
Practical, Predictable Lattice Basis Reduction2016-09-09Paper
FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second2015-09-30Paper
Simultaneous broadcast revisited2015-03-10Paper
A deterministic single exponential time algorithm for most lattice problems based on voronoi cell computations2014-08-13Paper
Improved Short Lattice Signatures in the Standard Model2014-08-07Paper
https://portal.mardi4nfdi.de/entity/Q54177232014-05-22Paper
A Deterministic Single Exponential Time Algorithm for Most Lattice Problems Based on Voronoi Cell Computations2013-09-25Paper
Hardness of SIS and LWE with Small Parameters2013-09-02Paper
https://portal.mardi4nfdi.de/entity/Q29138232012-09-27Paper
Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller2012-06-29Paper
The Geometry of Lattice Cryptography2011-09-16Paper
Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions2011-08-12Paper
https://portal.mardi4nfdi.de/entity/Q35793692010-08-06Paper
Improved cryptographic hash functions with worst-case/average-case connection2010-08-05Paper
Computational Soundness, Co-induction, and Encryption Cycles2010-06-01Paper
Cryptographic Functions from Worst-Case Complexity Assumptions2010-03-05Paper
The RSA group is pseudo-free2010-03-01Paper
On Bounded Distance Decoding, Unique Shortest Vectors, and the Minimum Distance Problem2009-10-20Paper
Theory of Cryptography2009-05-14Paper
Lattice-based Cryptography2009-03-12Paper
SWIFFT: A Modest Proposal for FFT Hashing2008-09-18Paper
The RSA Group is Pseudo-Free2008-05-06Paper
Worst‐Case to Average‐Case Reductions Based on Gaussian Measures2008-03-28Paper
Generalized compact knapsacks, cyclic lattices, and efficient one-way functions2008-03-11Paper
Asymptotically Efficient Lattice-Based Digital Signatures2008-03-05Paper
The Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial Characterization2008-03-05Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Corrupting One vs. Corrupting Many: The Case of Broadcast and Multicast Encryption2007-09-11Paper
Generalized Compact Knapsacks Are Collision Resistant2007-09-11Paper
On Bounded Distance Decoding for General Lattices2007-08-28Paper
Theory of Cryptography2007-02-12Paper
The complexity of the covering radius problem2006-02-07Paper
Theory of Cryptography2005-12-07Paper
Hardness of approximating the minimum distance of a linear code2005-05-31Paper
Almost Perfect Lattices, the Covering Radius Problem, and Applications to Ajtai's Connection Factor2005-02-21Paper
https://portal.mardi4nfdi.de/entity/Q48298102004-12-01Paper
The inapproximability of lattice and coding problems with preprocessing2004-10-04Paper
https://portal.mardi4nfdi.de/entity/Q47372322004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q47372602004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q44348732003-11-26Paper
https://portal.mardi4nfdi.de/entity/Q44349022003-11-26Paper
The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes2003-07-16Paper
A note on the minimal volume of almost cubic parallelepipeds2003-03-17Paper
https://portal.mardi4nfdi.de/entity/Q47872042003-01-09Paper
The hardness of the closest vector problem with preprocessing2002-08-04Paper
https://portal.mardi4nfdi.de/entity/Q45425302002-08-01Paper
Approximating shortest lattice vectors is not harder than approximating closest lattice vectors2002-07-25Paper
The Shortest Vector in a Lattice is Hard to Approximate to within Some Constant2001-06-21Paper
https://portal.mardi4nfdi.de/entity/Q45270132001-02-28Paper
https://portal.mardi4nfdi.de/entity/Q43645581998-01-07Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Daniele Micciancio