Publication | Date of Publication | Type |
---|
Black-box separations for non-interactive classical commitments in a quantum world | 2024-01-16 | Paper |
https://portal.mardi4nfdi.de/entity/Q6059367 | 2023-11-02 | Paper |
Collusion-resistant functional encryption for RAMs | 2023-08-25 | Paper |
A note on the post-quantum security of (ring) signatures | 2023-08-10 | Paper |
Post-quantum simulatable extraction with minimal assumptions: black-box and constant-round | 2023-06-30 | Paper |
On the impossibility of key agreements from quantum random oracles | 2023-06-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q6161142 | 2023-06-26 | Paper |
Foundations of Differentially Oblivious Algorithms | 2023-04-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q5875782 | 2023-02-03 | Paper |
Constant-round blind classical verification of quantum sampling | 2022-08-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q5090400 | 2022-07-18 | Paper |
Game-theoretic fairness meets multi-party protocols: the case of leader election | 2022-04-22 | Paper |
A black-box approach to post-quantum zero-knowledge in constant rounds | 2022-03-31 | Paper |
On the concurrent composition of quantum zero-knowledge | 2022-03-31 | Paper |
Round efficient secure multiparty quantum computation with identifiable abort | 2022-03-31 | Paper |
Classical verification of quantum computations with efficient verifier | 2022-03-23 | Paper |
When Simple Hash Functions Suffice | 2022-02-04 | Paper |
On the compressed-oracle technique, and post-quantum security of proofs of sequential work | 2021-12-08 | Paper |
On the need for large Quantum depth | 2021-01-19 | Paper |
Adaptively secure garbling schemes for parallel computations | 2020-04-30 | Paper |
A quantum-proof non-malleable extractor. With application to privacy amplification against active quantum adversaries | 2020-02-06 | Paper |
On quantum advantage in information theoretic single-server PIR | 2020-02-04 | Paper |
Foundations of Differentially Oblivious Algorithms | 2019-10-15 | Paper |
Quantum encryption and generalized Shannon impossibility | 2019-09-12 | Paper |
Game theoretic notions of fairness in multi-party coin toss | 2018-12-11 | Paper |
On the complexity of simulating auxiliary input | 2018-07-17 | Paper |
On the depth of oblivious parallel RAM | 2018-04-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q4601845 | 2018-01-24 | Paper |
On the impossibility of cryptography with tamperable randomness | 2018-01-05 | Paper |
Distributed algorithms for the Lovász local lemma and graph coloring | 2017-09-04 | Paper |
Can theories be tested? | 2017-05-16 | Paper |
On the power of nonuniformity in proofs of security | 2017-05-16 | Paper |
Delegating RAM Computations with Adaptive Soundness and Privacy | 2016-12-22 | Paper |
Non-Black-Box Simulation from One-Way Functions and Applications to Resettable Security | 2016-04-25 | Paper |
Cryptography for Parallel RAM from Indistinguishability Obfuscation | 2016-04-15 | Paper |
Oblivious Parallel RAM and Applications | 2016-04-08 | Paper |
Large-Scale Secure Computation: Multi-party Computation for (Parallel) RAM Programs | 2015-12-10 | Paper |
Constant-Round Concurrent Zero-Knowledge from Indistinguishability Obfuscation | 2015-12-10 | Paper |
Distributed algorithms for the Lovász local lemma and graph coloring | 2015-09-03 | Paper |
From Weak to Strong Zero-Knowledge and Applications | 2015-07-06 | Paper |
Tight Parallel Repetition Theorems for Public-Coin Arguments Using KL-Divergence | 2015-07-06 | Paper |
Statistically-secure ORAM with $\tilde{O}(\log^2 n)$ Overhead | 2015-01-06 | Paper |
https://portal.mardi4nfdi.de/entity/Q3191600 | 2014-10-06 | Paper |
S-T connectivity on digraphs with a known stationary distribution | 2014-09-09 | Paper |
On the Impossibility of Cryptography with Tamperable Randomness | 2014-08-07 | Paper |
Non-black-box simulation from one-way functions and applications to resettable security | 2014-08-07 | Paper |
The Randomness Complexity of Parallel Repetition | 2014-07-30 | Paper |
On Extractability Obfuscation | 2014-02-18 | Paper |
4-Round Resettably-Sound Zero Knowledge | 2014-02-18 | Paper |
Functional Encryption from (Small) Hardware Tokens | 2013-12-10 | Paper |
Randomness-Dependent Message Security | 2013-03-18 | Paper |
Chernoff-Hoeffding Bounds for Markov Chains: Generalized and Simplified | 2012-08-23 | Paper |
The Knowledge Tightness of Parallel Zero-Knowledge | 2012-06-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q3113742 | 2012-01-23 | Paper |
Memory Delegation | 2011-08-12 | Paper |
Efficient Secure Two-Party Exponentiation | 2011-02-11 | Paper |
Efficient String-Commitment from Weak Bit-Commitment | 2010-12-07 | Paper |
Improved Delegation of Computation Using Fully Homomorphic Encryption | 2010-08-24 | Paper |
Algorithms - ESA 2003 | 2010-03-03 | Paper |
Parallel Repetition Theorems for Interactive Arguments | 2010-02-24 | Paper |
Tight Bounds for Hashing Block Sources | 2008-11-27 | Paper |
An Optimal Algorithm for the Maximum-Density Segment Problem | 2005-02-21 | Paper |
Decomposition Methods for Linear Support Vector Machines | 2005-01-04 | Paper |
Radius Margin Bounds for Support Vector Machines with the RBF Kernel | 2004-09-07 | Paper |