Publication | Date of Publication | Type |
---|
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free | 2024-03-14 | Paper |
Multi-key and multi-input predicate encryption from learning with errors | 2023-12-12 | Paper |
Tensor rank reduction via coordinate flows | 2023-11-27 | Paper |
Implicit integration of nonlinear evolution equations on tensor manifolds | 2023-10-17 | Paper |
Continuously non-malleable codes against bounded-depth tampering | 2023-08-21 | Paper |
Coordinate-adaptive integration of PDEs on tensor manifolds | 2023-08-04 | Paper |
The Mori-Zwanzig formulation of deep learning | 2023-06-16 | Paper |
Identity-based matchmaking encryption without random oracles | 2023-05-12 | Paper |
Continuously non-malleable secret sharing: joint tampering, plain model and capacity | 2023-04-13 | Paper |
On adaptive security of delayed-input sigma protocols and Fiat-Shamir NIZKs | 2022-12-16 | Paper |
Non-malleable secret sharing against bounded joint-tampering attacks in the plain model | 2022-12-07 | Paper |
Universally composable subversion-resilient cryptography | 2022-08-30 | Paper |
Adaptive integration of nonlinear evolution equations on tensor manifolds | 2022-08-04 | Paper |
Shielded computations in smart contracts overcoming forks | 2022-06-17 | Paper |
Tensor methods for the Boltzmann-BGK equation | 2022-04-14 | Paper |
A new scalable algorithm for computational optimal control under uncertainty | 2022-04-11 | Paper |
Dynamic tensor approximation of high-dimensional nonlinear PDEs | 2022-04-08 | Paper |
The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free | 2021-12-08 | Paper |
Hypoellipticity and the Mori–Zwanzig formulation of stochastic differential equations | 2021-11-08 | Paper |
Rank-adaptive tensor methods for high-dimensional nonlinear PDEs | 2021-08-24 | Paper |
Match me if you can: matchmaking encryption and its applications | 2021-07-02 | Paper |
Spectral methods for nonlinear functionals and functional differential equations | 2021-06-01 | Paper |
Immunization against complete subversion without random oracles | 2021-02-15 | Paper |
Dynamically orthogonal tensor methods for high-dimensional nonlinear PDEs | 2021-01-28 | Paper |
Cryptographic reverse firewalls for interactive proof systems | 2021-01-25 | Paper |
Non-malleable encryption: simpler, shorter, stronger | 2020-11-06 | Paper |
Continuously non-malleable codes in the split-state model | 2020-11-06 | Paper |
Dynamic tensor approximation of high-dimensional nonlinear PDEs | 2020-07-18 | Paper |
Stability analysis of hierarchical tensor methods for time-dependent PDEs | 2020-07-02 | Paper |
Continuously non-malleable codes in the split-state model from minimal assumptions | 2020-06-30 | Paper |
A black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreement | 2020-04-30 | Paper |
Continuously non-malleable secret sharing for general access structures | 2020-04-30 | Paper |
Subversion-resilient signatures: definitions, constructions and applications | 2020-04-21 | Paper |
Generalized Langevin equations for systems with local interactions | 2020-04-07 | Paper |
Non-malleable secret sharing in the computational setting: adaptive tampering, noisy-leakage resilience, and improved rate | 2020-03-09 | Paper |
Match me if you can: matchmaking encryption and its applications | 2020-03-09 | Paper |
Rate-optimizing compilers for continuously non-malleable codes | 2020-01-30 | Paper |
Public immunization against complete subversion without random oracles | 2020-01-30 | Paper |
Density Propagation with Characteristics-based Deep Learning | 2019-11-21 | Paper |
A new scalable algorithm for computational optimal control under uncertainty | 2019-09-17 | Paper |
Parallel tensor methods for high-dimensional linear PDEs | 2019-07-11 | Paper |
Data-driven closures for stochastic dynamical systems | 2019-06-28 | Paper |
Faber approximation of the Mori-Zwanzig equation | 2019-06-28 | Paper |
Continuously non-malleable codes with split-state refresh | 2019-01-18 | Paper |
Numerical methods for high-dimensional kinetic equations | 2018-11-22 | Paper |
On the estimation of the Mori-Zwanzig memory integral | 2018-11-16 | Paper |
Secure outsourcing of cryptographic circuits manufacturing | 2018-11-07 | Paper |
Continuously non-malleable codes with split-state refresh | 2018-08-10 | Paper |
Fiat-Shamir for highly sound protocols is instantiable | 2018-06-08 | Paper |
The numerical approximation of nonlinear functionals and functional differential equations | 2018-03-26 | Paper |
Efficient authentication from hard learning problems | 2018-02-15 | Paper |
Multi-fidelity Gaussian process regression for prediction of random fields | 2017-12-14 | Paper |
Non-malleable codes for space-bounded tampering | 2017-11-15 | Paper |
Wick–Malliavin approximation to nonlinear stochastic partial differential equations: analysis and simulations | 2017-09-29 | Paper |
Convolutionless Nakajima–Zwanzig equations for stochastic analysis in nonlinear dynamical systems | 2017-09-29 | Paper |
Statistical analysis and simulation of random shocks in stochastic Burgers equation | 2017-09-29 | Paper |
Duality and conditional expectations in the Nakajima-Mori-Zwanzig formulation | 2017-09-11 | Paper |
Naor-Yung paradigm with shared randomness and applications | 2017-09-05 | Paper |
Predictable Arguments of Knowledge | 2017-06-13 | Paper |
A computable evolution equation for the joint response-excitation probability density function of stochastic dynamical systems | 2017-06-07 | Paper |
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits | 2017-04-28 | Paper |
Bounded tamper resilience: how to go beyond the algebraic barrier | 2017-03-02 | Paper |
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience | 2017-02-01 | Paper |
Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model | 2016-12-22 | Paper |
Exact PDF equations and closure approximations for advective-reactive transport | 2016-12-05 | Paper |
Numerical methods for high-dimensional probability density function equations | 2016-12-05 | Paper |
Rate-limited secure function evaluation | 2016-10-21 | Paper |
Naor-Yung Paradigm with Shared Randomness and Applications | 2016-10-21 | Paper |
Fiat–Shamir for Highly Sound Protocols Is Instantiable | 2016-10-21 | Paper |
Multifidelity Information Fusion Algorithms for High-Dimensional Systems and Massive Data sets | 2016-07-20 | Paper |
Chosen-Ciphertext Security from Subset Sum | 2016-04-13 | Paper |
Non-Malleable Encryption: Simpler, Shorter, Stronger | 2016-03-23 | Paper |
(De-)Constructing TLS 1.3 | 2016-01-12 | Paper |
Algorithms for Propagating Uncertainty Across Heterogeneous Domains | 2015-12-18 | Paper |
Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation | 2015-10-27 | Paper |
The Chaining Lemma and Its Application | 2015-09-24 | Paper |
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations | 2015-09-21 | Paper |
A Tamper and Leakage Resilient von Neumann Architecture | 2015-08-27 | Paper |
From Single-Bit to Multi-bit Public-Key Encryption via Non-malleable Codes | 2015-07-06 | Paper |
On the Non-malleability of the Fiat-Shamir Transform | 2014-08-20 | Paper |
A Second Look at Fischlin’s Transformation | 2014-06-24 | Paper |
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits | 2014-05-27 | Paper |
DIFFERENTIAL CONSTRAINTS FOR THE PROBABILITY DENSITY FUNCTION OF STOCHASTIC SOLUTIONS TO THE WAVE EQUATION | 2014-04-25 | Paper |
New evolution equations for the joint response-excitation probability density function of stochastic solutions to first-order nonlinear PDEs | 2014-04-22 | Paper |
Conjugate flow action functionals | 2014-04-17 | Paper |
Leakage-Resilient Signatures with Graceful Degradation | 2014-03-25 | Paper |
Continuous Non-malleable Codes | 2014-02-18 | Paper |
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier | 2013-12-10 | Paper |
Adaptive Discontinuous Galerkin Method for Response-Excitation PDF Equations | 2013-10-28 | Paper |
Outsourced Pattern Matching | 2013-08-07 | Paper |
Rate-Limited Secure Function Evaluation: Definitions and Constructions | 2013-04-19 | Paper |
On the Connection between Leakage Tolerance and Adaptive Security | 2013-04-19 | Paper |
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience | 2011-07-06 | Paper |
Efficient Authentication from Hard Learning Problems | 2011-05-27 | Paper |
A fully symmetric nonlinear biorthogonal decomposition theory for random fields | 2011-03-08 | Paper |
Leakage-Resilient Storage | 2010-09-10 | Paper |
Stochastic bifurcation analysis of Rayleigh–Bénard convection | 2010-06-30 | Paper |
Convective derivatives and Reynolds transport in curvilinear time-dependent coordinates | 2009-04-08 | Paper |
Stochastic low-dimensional modelling of a random laminar wake past a circular cylinder | 2008-10-24 | Paper |
On proper orthogonal decomposition of randomly perturbed fields with applications to flow past a cylinder and natural convection over a horizontal plate | 2006-08-24 | Paper |
Gappy data and reconstruction procedures for flow past a cylinder | 2005-04-23 | Paper |