Daniel Wichs

From MaRDI portal
Revision as of 14:14, 7 October 2023 by Import231006081045 (talk | contribs) (Created automatically from import231006081045)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:315545

Available identifiers

zbMath Open wichs.danielMaRDI QIDQ315545

List of research outcomes

PublicationDate of PublicationType
https://portal.mardi4nfdi.de/entity/Q61262892024-04-09Paper
The pseudorandom oracle model and ideal obfuscation2024-02-06Paper
Universal amplification of KDM security: from 1-key circular to multi-key KDM2024-02-02Paper
Speak much, remember little: cryptography in the bounded storage model, revisited2024-01-16Paper
A map of witness maps: new definitions and connections2023-11-16Paper
Witness encryption and null-iO from evasive LWE2023-08-25Paper
Post-quantum insecurity from LWE2023-08-14Paper
Nearly optimal property preserving hashing2023-06-30Paper
Succinct LWE sampling, random polynomials, and obfuscation2023-04-13Paper
Updatable public key encryption in the standard model2023-04-13Paper
Adaptively secure MPC with sublinear communication complexity2023-04-13Paper
Leakage-resilient key exchange and two-seed extractors2022-11-09Paper
Incompressible encodings2022-11-09Paper
Witness Maps and Applications2022-10-13Paper
Incompressible cryptography2022-08-30Paper
Authentication in the bounded storage model2022-08-30Paper
Targeted lossy functions and applications2022-05-18Paper
Limits on the adaptive security of Yao's garbling2022-04-22Paper
Two-round oblivious transfer from CDH or LPN2022-03-23Paper
Candidate obfuscation via oblivious LWE sampling2021-12-08Paper
Extracting randomness from extractor-dependent sources2021-12-01Paper
Statistical ZAPR arguments from bilinear maps2021-12-01Paper
Optimal broadcast encryption from LWE and pairings in the standard model2021-12-01Paper
Is there an oblivious RAM lower bound for online reads?2021-07-02Paper
Non-malleable codes for decision trees2020-05-20Paper
On the plausibility of fully homomorphic encryption for RAMs2020-05-20Paper
From cryptomania to obfustopia through secret-key functional encryption2020-04-28Paper
New constructions of reusable designated-verifier NIZKs2020-03-09Paper
Broadcast and trace with \(N^{\varepsilon}\) ciphertext size from standard assumptions2020-03-09Paper
Adaptively secure MPC with sublinear communication complexity2020-03-09Paper
Private anonymous data access2020-02-06Paper
Reusable designated-verifier NIZKs for all NP from CDH2020-02-06Paper
Worst-case hardness for LPN and cryptographic hashing via code smoothing2020-02-04Paper
Fiat-Shamir: from practice to theory2020-01-30Paper
Succinct delegation for low-space non-deterministic computation2019-08-22Paper
Traitor-tracing from LWE made simple and attribute-based2018-12-06Paper
Watermarking PRFs under standard assumptions: public marking and security with extraction queries2018-12-06Paper
Non-Malleable Codes2018-12-06Paper
Is there an oblivious RAM lower bound for online reads?2018-12-06Paper
Watermarking Cryptographic Capabilities2018-12-05Paper
Non-trivial witness encryption and null-iO from standard assumptions2018-10-17Paper
Hardness of non-interactive differential privacy from one-way functions2018-09-12Paper
Multi-key searchable encryption, revisited2018-05-16Paper
The edited truth2018-01-19Paper
Adaptively indistinguishable garbled circuits2018-01-19Paper
How to eat your entropy and have it too: optimal recovery strategies for compromised RNGs2018-01-05Paper
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input2018-01-05Paper
Be adaptive, avoid overcommitting2017-11-03Paper
Watermarking cryptographic capabilities2017-09-29Paper
On the Communication Complexity of Secure Function Evaluation with Long Output2017-05-19Paper
Barriers in cryptography with weak, correlated and leaky sources2017-05-16Paper
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits2017-04-28Paper
Dynamic proofs of retrievability via oblivious RAM2017-03-02Paper
Standard Security Does Not Imply Indistinguishability Under Selective Opening2016-12-22Paper
From Cryptomania to Obfustopia Through Secret-Key Functional Encryption2016-12-22Paper
Adaptive Security of Yao’s Garbled Circuits2016-12-21Paper
Spooky Encryption and Its Applications2016-11-09Paper
Adaptively Secure Garbled Circuits from One-Way Functions2016-11-09Paper
A counterexample to the chain rule for conditional HILL entropy2016-10-28Paper
Leakage-resilient cryptography from minimal assumptions2016-09-21Paper
Essentially Optimal Robust Secret Sharing with Maximal Corruptions2016-09-09Paper
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key2016-07-15Paper
Two Round Multiparty Computation via Multi-key FHE2016-07-15Paper
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators2016-06-10Paper
Obfuscating Conjunctions under Entropic Ring LWE2016-04-15Paper
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM2016-04-08Paper
Perfect Structure on the Edge of Chaos2016-03-23Paper
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions2015-08-27Paper
Leveled Fully Homomorphic Signatures from Standard Lattices2015-08-21Paper
Tamper Detection and Continuous Non-malleable Codes2015-07-06Paper
Non-malleable extractors and symmetric key cryptography from weak secrets2015-02-04Paper
Optimizing ORAM and Using It Efficiently for Secure Computation2014-08-19Paper
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input2014-08-07Paper
How to Eat Your Entropy and Have It Too – Optimal Recovery Strategies for Compromised RNGs2014-08-07Paper
Separating succinct non-interactive arguments from all falsifiable assumptions2014-06-05Paper
Key Derivation without Entropy Waste2014-05-27Paper
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits2014-05-27Paper
Garbled RAM Revisited2014-05-27Paper
Fully Homomorphic Message Authenticators2013-12-10Paper
On Continual Leakage of Discrete Log Representations2013-12-10Paper
Learning with Rounding, Revisited2013-09-02Paper
Fully leakage-resilient signatures2013-08-01Paper
Leakage-Resilient Cryptography from Minimal Assumptions2013-05-31Paper
Dynamic Proofs of Retrievability via Oblivious RAM2013-05-31Paper
Why “Fiat-Shamir for Proofs” Lacks a Proof2013-03-18Paper
Message Authentication, Revisited2012-06-29Paper
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE2012-06-29Paper
Counterexamples to Hardness Amplification beyond Negligible2012-06-15Paper
Key-Evolution Schemes Resilient to Space-Bounded Leakage2011-08-12Paper
Fully Leakage-Resilient Signatures2011-05-27Paper
One-Time Computable Self-erasing Functions2011-05-19Paper
Efficient Public-Key Cryptography in the Presence of Key Leakage2010-12-07Paper
Survey: Leakage Resilience and the Bounded Retrieval Model2010-09-29Paper
Public-Key Encryption in the Bounded-Retrieval Model2010-06-01Paper
On Symmetric Encryption and Point Obfuscation2010-02-24Paper
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model2009-10-20Paper
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer2009-10-20Paper
Proofs of Retrievability via Hardness Amplification2009-03-03Paper
Universally Composable Multiparty Computation with Partially Isolated Parties2009-03-03Paper
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors2008-04-15Paper
Isolated Proofs of Knowledge and Isolated Zero Knowledge2008-04-15Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Daniel Wichs