Divesh Aggarwal

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Quantum measurement adversary
IEEE Transactions on Information Theory
2024-07-21Paper
Quantum secure non-malleable codes in the split-state model
IEEE Transactions on Information Theory
2024-07-21Paper
Lattice problems beyond polynomial time
 
2024-05-08Paper
scientific article; zbMATH DE number 7829234 (Why is no real title available?)
 
2024-04-09Paper
Extractors: low entropy requirements colliding with non-malleability
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
scientific article; zbMATH DE number 7788447 (Why is no real title available?)
 
2024-01-15Paper
scientific article; zbMATH DE number 7788483 (Why is no real title available?)
 
2024-01-15Paper
Algebraic restriction codes and their applications
Algorithmica
2023-12-13Paper
Rate one-third non-malleable codes
Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing
2023-12-08Paper
Extractor Lower Bounds, Revisited
 
2023-10-31Paper
On secret sharing, randomness, and random-less reductions for secret sharing
Theory of Cryptography
2023-08-14Paper
Slide reduction, revisited -- filling the gaps in SVP approximation
 
2022-11-09Paper
Privacy Amplification With Tamperable Memory via Non-Malleable Two-Source Extractors
IEEE Transactions on Information Theory
2022-08-19Paper
scientific article; zbMATH DE number 7561389 (Why is no real title available?)
 
2022-07-21Paper
A \(2^{n/2}\)-time algorithm for \(\sqrt{n} \)-SVP and \(\sqrt{n} \)-Hermite SVP, and an improved time-approximation tradeoff for (H)SVP
 
2021-12-08Paper
How to extract useful randomness from unreliable sources
 
2021-12-01Paper
A note on the concrete hardness of the shortest independent vector in lattices
Information Processing Letters
2021-03-11Paper
A new public-key cryptosystem via Mersenne numbers
 
2020-06-30Paper
Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures
 
2020-03-09Paper
A quantum-proof non-malleable extractor. With application to privacy amplification against active quantum adversaries
 
2020-02-06Paper
Continuous non-malleable codes in the 8-split-state model
 
2020-02-04Paper
Just take the average! An embarrassingly simple \(2^n\)-time algorithm for SVP (and CVP)
 
2019-10-25Paper
(Gap/S)ETH hardness of SVP
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing
2019-08-22Paper
An improved constant in Banaszczyk's transference theorem
 
2019-07-21Paper
Non-Malleable Codes from Additive Combinatorics
SIAM Journal on Computing
2018-04-26Paper
Inception makes non-malleable codes stronger
 
2018-01-19Paper
Breaking RSA Generically Is Equivalent to Factoring
IEEE Transactions on Information Theory
2017-04-28Paper
A note on discrete Gaussian combinations of lattice vectors
Chicago Journal of Theoretical Computer Science
2016-08-16Paper
Improved hardness results for unique shortest vector problem
Information Processing Letters
2016-07-07Paper
Optimal computational split-state non-malleable codes
Theory of Cryptography
2016-04-08Paper
Non-malleable reductions and applications
Proceedings of the forty-seventh annual ACM symposium on Theory of Computing
2015-08-21Paper
Solving the shortest vector problem in \(2^n\) time using discrete Gaussian sampling (extended abstract)
Proceedings of the forty-seventh annual ACM symposium on Theory of Computing
2015-08-21Paper
Leakage-resilient non-malleable codes
Theory of Cryptography
2015-07-06Paper
Non-malleable codes from additive combinatorics (extended abstract)
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
Affine-evasive sets modulo a prime
Information Processing Letters
2014-12-09Paper
Amplifying Privacy in Privacy Amplification
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy
Lecture Notes in Computer Science
2011-12-02Paper
Breaking RSA Generically Is Equivalent to Factoring
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Algorithms on Graphs with Small Dominating Targets
Algorithms and Computation
2008-04-24Paper
Graph-Theoretic Concepts in Computer Science
Lecture Notes in Computer Science
2006-11-01Paper


Research outcomes over time


This page was built for person: Divesh Aggarwal