Publication | Date of Publication | Type |
---|
Lattice problems beyond polynomial time | 2024-05-08 | Paper |
Boosting batch arguments and RAM delegation | 2024-05-08 | Paper |
Succinct computational secret sharing | 2024-05-08 | Paper |
Quantum advantage from any non-local game | 2024-05-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q6126254 | 2024-04-09 | Paper |
https://portal.mardi4nfdi.de/entity/Q6126347 | 2024-04-09 | Paper |
Layout graphs, random walks and the \(t\)-wise independence of SPN block ciphers | 2024-02-02 | Paper |
SNARGs and PPAD hardness from the decisional Diffie-Hellman assumption | 2023-12-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q6090904 | 2023-11-20 | Paper |
Witness encryption and null-iO from evasive LWE | 2023-08-25 | Paper |
Succinct classical verification of quantum computation | 2023-06-28 | Paper |
Locally verifiable signature and key aggregation | 2023-06-28 | Paper |
Succinct LWE sampling, random polynomials, and obfuscation | 2023-04-13 | Paper |
Somewhere statistical soundness, post-quantum security, and SNARGs | 2023-03-31 | Paper |
Cryptography from Information Loss. | 2023-02-03 | Paper |
Fiat-Shamir for repeated squaring with applications to PPAD-hardness and VDFs | 2022-12-07 | Paper |
Homomorphic Encryption Standard | 2022-11-02 | Paper |
Asymptotically quasi-optimal cryptography | 2022-08-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q5090388 | 2022-07-18 | Paper |
https://portal.mardi4nfdi.de/entity/Q5090419 | 2022-07-18 | Paper |
A note on perfect correctness by derandomization | 2022-06-16 | Paper |
The \(t\)-wise independence of substitution-permutation networks | 2022-05-18 | Paper |
Oblivious transfer is in MiniQCrypt | 2021-12-08 | Paper |
Extracting randomness from extractor-dependent sources | 2021-12-01 | Paper |
Statistical ZAPR arguments from bilinear maps | 2021-12-01 | Paper |
Zero-Knowledge Proofs of Proximity | 2021-06-15 | Paper |
Structure Versus Hardness Through the Obfuscation Lens | 2021-02-08 | Paper |
Data structures meet cryptography: 3SUM with preprocessing | 2021-01-19 | Paper |
Some Open Problems in Information-Theoretic Cryptography | 2020-11-25 | Paper |
Lattice trapdoors and IBE from middle-product LWE | 2020-04-30 | Paper |
Matrix PRFs: constructions, attacks, and applications to obfuscation | 2020-04-30 | Paper |
Optimal bounded-collusion secure functional encryption | 2020-04-30 | Paper |
Reusable non-interactive secure computation | 2020-03-09 | Paper |
Worst-case hardness for LPN and cryptographic hashing via code smoothing | 2020-02-04 | Paper |
Breaking the circuit-size barrier in secret sharing | 2019-08-22 | Paper |
Indistinguishability Obfuscation from Functional Encryption | 2019-02-25 | Paper |
Traitor-tracing from LWE made simple and attribute-based | 2018-12-06 | Paper |
Watermarking Cryptographic Capabilities | 2018-12-05 | Paper |
GGH15 beyond permutation branching programs: proofs, attacks, and candidates | 2018-09-26 | Paper |
Attribute-Based Encryption for Circuits | 2018-08-02 | Paper |
Anonymous IBE, leakage resilience and circular security from new assumptions | 2018-07-09 | Paper |
Towards breaking the exponential barrier for general secret sharing | 2018-07-09 | Paper |
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings | 2018-07-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4638056 | 2018-05-03 | Paper |
Limits on the locality of pseudorandom generators and applications to indistinguishability obfuscation | 2018-01-19 | Paper |
Private constrained PRFs (and more) from LWE | 2018-01-19 | Paper |
Multikey Fully Homomorphic Encryption and Applications | 2017-12-18 | Paper |
Structure vs. hardness through the obfuscation lens | 2017-11-03 | Paper |
Conditional disclosure of secrets via non-linear reconstruction | 2017-11-03 | Paper |
Watermarking cryptographic capabilities | 2017-09-29 | Paper |
Chosen-Ciphertext Secure Fully Homomorphic Encryption | 2017-06-13 | Paper |
A Note on Perfect Correctness by Derandomization | 2017-06-13 | Paper |
Lattice-based FHE as secure as PKE | 2017-05-19 | Paper |
SHIELD: Scalable Homomorphic Implementation of Encrypted Data-Classifiers | 2017-05-16 | Paper |
3-Message Zero Knowledge Against Human Ignorance | 2016-12-21 | Paper |
Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security | 2016-11-09 | Paper |
Fine-Grained Cryptography | 2016-11-09 | Paper |
(Leveled) Fully Homomorphic Encryption without Bootstrapping | 2016-10-24 | Paper |
(Leveled) fully homomorphic encryption without bootstrapping | 2016-10-07 | Paper |
Secret Sharing and Statistical Zero Knowledge | 2016-06-10 | Paper |
Obfuscating Conjunctions under Entropic Ring LWE | 2016-04-15 | Paper |
Time-Lock Puzzles from Randomized Encodings | 2016-04-15 | Paper |
Indistinguishability Obfuscation: From Approximate to Exact | 2016-03-23 | Paper |
On Basing Private Information Retrieval on NP-Hardness | 2016-03-23 | Paper |
Predicate Encryption for Circuits from LWE | 2015-12-10 | Paper |
From Selective to Adaptive Security in Functional Encryption | 2015-12-10 | Paper |
Succinct Garbling and Indistinguishability Obfuscation for RAM Programs | 2015-08-21 | Paper |
Leveled Fully Homomorphic Signatures from Standard Lattices | 2015-08-21 | Paper |
Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions | 2015-07-06 | Paper |
Aggregate Pseudorandom Functions and Connections to Learning | 2015-07-06 | Paper |
Obfuscation of Probabilistic Circuits and Applications | 2015-07-06 | Paper |
Protecting Circuits from Computationally Bounded and Noisy Leakage | 2015-02-09 | Paper |
Byzantine agreement in the full-information model in O(log n) rounds | 2014-11-25 | Paper |
How to Compute on Encrypted Data | 2014-08-20 | Paper |
Attribute-based encryption for circuits | 2014-08-07 | Paper |
Reusable garbled circuits and succinct functional encryption | 2014-08-07 | Paper |
Efficient Fully Homomorphic Encryption from (Standard) LWE | 2014-07-30 | Paper |
Efficient Fully Homomorphic Encryption from (Standard) $\mathsf{LWE}$ | 2014-07-30 | Paper |
Computing Blindfolded: New Developments in Fully Homomorphic Encryption | 2014-07-30 | Paper |
(Leveled) Fully Homomorphic Encryption without Bootstrapping | 2014-07-01 | Paper |
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits | 2014-05-27 | Paper |
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption | 2014-05-13 | Paper |
On Continual Leakage of Discrete Log Representations | 2013-12-10 | Paper |
Round-optimal password-based authenticated key exchange | 2013-11-15 | Paper |
Functional Encryption: New Perspectives and Lower Bounds | 2013-09-17 | Paper |
How to Run Turing Machines on Encrypted Data | 2013-09-17 | Paper |
Functional Encryption with Bounded Collusions via Multi-party Computation | 2012-09-25 | Paper |
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices | 2012-07-20 | Paper |
Efficient Password Authenticated Key Exchange via Oblivious Transfer | 2012-07-20 | Paper |
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE | 2012-06-29 | Paper |
Functional Re-encryption and Collusion-Resistant Obfuscation | 2012-06-15 | Paper |
How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption | 2012-06-15 | Paper |
Securely obfuscating re-encryption | 2012-01-13 | Paper |
Functional Encryption for Inner Product Predicates from Learning with Errors | 2011-12-02 | Paper |
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages | 2011-08-12 | Paper |
Round-Optimal Password-Based Authenticated Key Exchange | 2011-05-19 | Paper |
New Developments in Leakage-Resilient Cryptography | 2011-03-15 | Paper |
A Group Signature Scheme from Lattice Assumptions | 2010-12-07 | Paper |
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits | 2010-08-24 | Paper |
Fully Homomorphic Encryption over the Integers | 2010-06-01 | Paper |
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases | 2010-06-01 | Paper |
A Simple BGN-Type Cryptosystem from LWE | 2010-06-01 | Paper |
Public-Key Encryption Schemes with Auxiliary Inputs | 2010-02-24 | Paper |
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices | 2009-12-15 | Paper |
Signature Schemes with Bounded Leakage Resilience | 2009-12-15 | Paper |
Simultaneous Hardcore Bits and Cryptography against Memory Attacks | 2009-03-03 | Paper |
How Efficient Can Memory Checking Be? | 2009-03-03 | Paper |
Weak Verifiable Random Functions | 2009-03-03 | Paper |
Adaptive One-Way Functions and Applications | 2009-02-10 | Paper |
Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems | 2009-02-10 | Paper |
A Framework for Efficient and Composable Oblivious Transfer | 2009-02-10 | Paper |
Trapdoors for hard lattices and new cryptographic constructions | 2009-01-05 | Paper |
Bounded CCA2-Secure Encryption | 2008-05-15 | Paper |
Relations Among Notions of Non-malleability for Encryption | 2008-05-15 | Paper |
Secure Computation from Random Error Correcting Codes | 2007-11-29 | Paper |
Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One | 2007-09-04 | Paper |
Securely Obfuscating Re-encryption | 2007-08-30 | Paper |
Distributed Computing | 2006-11-01 | Paper |