| Publication | Date of Publication | Type |
|---|
| Cryptographic reverse firewalls for interactive proof systems | 2026-03-18 | Paper |
Compact proofs of partial knowledge for overlapping CNF formulae Journal of Cryptology | 2024-12-27 | Paper |
| Improved reductions from noisy to bounded and probing leakages via hockey-stick divergences | 2024-12-13 | Paper |
| Registered (inner-product) functional encryption | 2024-09-13 | Paper |
Multi-key and multi-input predicate encryption (for conjunctions) from learning with errors Journal of Cryptology | 2024-07-10 | Paper |
| From privacy-only to simulatable OT: black-box, round-optimal, information-theoretic | 2024-06-25 | Paper |
| Non-malleable fuzzy extractors | 2024-05-31 | Paper |
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free IEEE Transactions on Information Theory | 2024-03-14 | Paper |
Multi-key and multi-input predicate encryption from learning with errors Advances in Cryptology – EUROCRYPT 2023 | 2023-12-12 | Paper |
Tensor rank reduction via coordinate flows Journal of Computational Physics | 2023-11-27 | Paper |
| On the complete non-malleability of the Fujisaki-Okamoto transform | 2023-11-10 | Paper |
Implicit integration of nonlinear evolution equations on tensor manifolds Journal of Scientific Computing | 2023-10-17 | Paper |
Continuously non-malleable codes against bounded-depth tampering Advances in Cryptology – ASIACRYPT 2022 | 2023-08-21 | Paper |
| Coordinate-adaptive integration of PDEs on tensor manifolds | 2023-08-04 | Paper |
The Mori-Zwanzig formulation of deep learning Research in the Mathematical Sciences | 2023-06-16 | Paper |
Identity-based matchmaking encryption without random oracles Lecture Notes in Computer Science | 2023-05-12 | Paper |
| Continuously non-malleable secret sharing: joint tampering, plain model and capacity | 2023-04-13 | Paper |
| On adaptive security of delayed-input sigma protocols and Fiat-Shamir NIZKs | 2022-12-16 | Paper |
| Non-malleable secret sharing against bounded joint-tampering attacks in the plain model | 2022-12-07 | Paper |
| Universally composable subversion-resilient cryptography | 2022-08-30 | Paper |
Adaptive integration of nonlinear evolution equations on tensor manifolds Journal of Scientific Computing | 2022-08-04 | Paper |
| Shielded computations in smart contracts overcoming forks | 2022-06-17 | Paper |
Tensor methods for the Boltzmann-BGK equation Journal of Computational Physics | 2022-04-14 | Paper |
A new scalable algorithm for computational optimal control under uncertainty Journal of Computational Physics | 2022-04-11 | Paper |
Dynamic tensor approximation of high-dimensional nonlinear PDEs Journal of Computational Physics | 2022-04-08 | Paper |
| The mother of all leakages: how to simulate noisy leakages via bounded leakage (almost) for free | 2021-12-08 | Paper |
Hypoellipticity and the Mori-Zwanzig formulation of stochastic differential equations Journal of Mathematical Physics | 2021-11-08 | Paper |
Rank-adaptive tensor methods for high-dimensional nonlinear PDEs Journal of Scientific Computing | 2021-08-24 | Paper |
Match me if you can: matchmaking encryption and its applications Journal of Cryptology | 2021-07-02 | Paper |
Spectral methods for nonlinear functionals and functional differential equations Research in the Mathematical Sciences | 2021-06-01 | Paper |
Immunization against complete subversion without random oracles Theoretical Computer Science | 2021-02-15 | Paper |
Dynamically orthogonal tensor methods for high-dimensional nonlinear PDEs Journal of Computational Physics | 2021-01-28 | Paper |
Cryptographic reverse firewalls for interactive proof systems Theoretical Computer Science | 2021-01-25 | Paper |
Non-malleable encryption: simpler, shorter, stronger Journal of Cryptology | 2020-11-06 | Paper |
Continuously non-malleable codes in the split-state model Journal of Cryptology | 2020-11-06 | Paper |
Dynamic tensor approximation of high-dimensional nonlinear PDEs (available as arXiv preprint) | 2020-07-18 | Paper |
Stability analysis of hierarchical tensor methods for time-dependent PDEs Journal of Computational Physics | 2020-07-02 | Paper |
| Continuously non-malleable codes in the split-state model from minimal assumptions | 2020-06-30 | Paper |
| Continuously non-malleable secret sharing for general access structures | 2020-04-30 | Paper |
| A black-box construction of fully-simulatable, round-optimal oblivious transfer from strongly uniform key agreement | 2020-04-30 | Paper |
Subversion-resilient signatures: definitions, constructions and applications Theoretical Computer Science | 2020-04-21 | Paper |
Generalized Langevin equations for systems with local interactions Journal of Statistical Physics | 2020-04-07 | Paper |
| Non-malleable secret sharing in the computational setting: adaptive tampering, noisy-leakage resilience, and improved rate | 2020-03-09 | Paper |
Match me if you can: matchmaking encryption and its applications Advances in Cryptology – CRYPTO 2019 | 2020-03-09 | Paper |
| Public immunization against complete subversion without random oracles | 2020-01-30 | Paper |
| Rate-optimizing compilers for continuously non-malleable codes | 2020-01-30 | Paper |
| Density Propagation with Characteristics-based Deep Learning | 2019-11-21 | Paper |
A new scalable algorithm for computational optimal control under uncertainty (available as arXiv preprint) | 2019-09-17 | Paper |
Parallel tensor methods for high-dimensional linear PDEs Journal of Computational Physics | 2019-07-11 | Paper |
Data-driven closures for stochastic dynamical systems Journal of Computational Physics | 2019-06-28 | Paper |
Faber approximation of the Mori-Zwanzig equation Journal of Computational Physics | 2019-06-28 | Paper |
Continuously non-malleable codes with split-state refresh Theoretical Computer Science | 2019-01-18 | Paper |
| Numerical methods for high-dimensional kinetic equations | 2018-11-22 | Paper |
On the estimation of the Mori-Zwanzig memory integral Journal of Mathematical Physics | 2018-11-16 | Paper |
| Secure outsourcing of cryptographic circuits manufacturing | 2018-11-07 | Paper |
Continuously non-malleable codes with split-state refresh Applied Cryptography and Network Security | 2018-08-10 | Paper |
Fiat-Shamir for highly sound protocols is instantiable Theoretical Computer Science | 2018-06-08 | Paper |
The numerical approximation of nonlinear functionals and functional differential equations Physics Reports | 2018-03-26 | Paper |
Efficient authentication from hard learning problems Journal of Cryptology | 2018-02-15 | Paper |
Multi-fidelity Gaussian process regression for prediction of random fields Journal of Computational Physics | 2017-12-14 | Paper |
| Non-malleable codes for space-bounded tampering | 2017-11-15 | Paper |
Wick–Malliavin approximation to nonlinear stochastic partial differential equations: analysis and simulations Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences | 2017-09-29 | Paper |
Convolutionless Nakajima-Zwanzig equations for stochastic analysis in nonlinear dynamical systems Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences | 2017-09-29 | Paper |
Statistical analysis and simulation of random shocks in stochastic Burgers equation Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences | 2017-09-29 | Paper |
Duality and conditional expectations in the Nakajima-Mori-Zwanzig formulation Journal of Mathematical Physics | 2017-09-11 | Paper |
Naor-Yung paradigm with shared randomness and applications Theoretical Computer Science | 2017-09-05 | Paper |
Predictable arguments of knowledge Lecture Notes in Computer Science | 2017-06-13 | Paper |
A computable evolution equation for the joint response-excitation probability density function of stochastic dynamical systems Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences | 2017-06-07 | Paper |
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Bounded tamper resilience: how to go beyond the algebraic barrier Journal of Cryptology | 2017-03-02 | Paper |
Efficient public-key cryptography with bounded leakage and tamper resilience Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Fully leakage-resilient signatures revisited: graceful degradation, noisy leakage, and construction in the bounded-retrieval model Theoretical Computer Science | 2016-12-22 | Paper |
Exact PDF equations and closure approximations for advective-reactive transport Journal of Computational Physics | 2016-12-05 | Paper |
Numerical methods for high-dimensional probability density function equations Journal of Computational Physics | 2016-12-05 | Paper |
Rate-limited secure function evaluation Theoretical Computer Science | 2016-10-21 | Paper |
Fiat-Shamir for highly sound protocols is instantiable Lecture Notes in Computer Science | 2016-10-21 | Paper |
Naor-Yung Paradigm with Shared Randomness and Applications Lecture Notes in Computer Science | 2016-10-21 | Paper |
Multifidelity information fusion algorithms for high-dimensional systems and massive data sets SIAM Journal on Scientific Computing | 2016-07-20 | Paper |
Chosen-ciphertext security from subset sum Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Non-malleable encryption: simpler, shorter, stronger Theory of Cryptography | 2016-03-23 | Paper |
(De-)constructing TLS 1.3 Progress in Cryptology -- INDOCRYPT 2015 | 2016-01-12 | Paper |
Algorithms for propagating uncertainty across heterogeneous domains SIAM Journal on Scientific Computing | 2015-12-18 | Paper |
Mind your coins: fully leakage-resilient signatures with graceful degradation Automata, Languages, and Programming | 2015-10-27 | Paper |
The Chaining Lemma and its application Lecture Notes in Computer Science | 2015-09-24 | Paper |
A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations Cryptography and Information Security in the Balkans | 2015-09-21 | Paper |
A tamper and leakage resilient von Neumann architecture Lecture Notes in Computer Science | 2015-08-27 | Paper |
From single-bit to multi-bit public-key encryption via non-malleable codes Theory of Cryptography | 2015-07-06 | Paper |
On the Non-malleability of the Fiat-Shamir Transform Lecture Notes in Computer Science | 2014-08-20 | Paper |
A second look at Fischlin's transformation Progress in Cryptology – AFRICACRYPT 2014 | 2014-06-24 | Paper |
Efficient non-malleable codes and key-derivation for poly-size tampering circuits Advances in Cryptology – EUROCRYPT 2014 | 2014-05-27 | Paper |
DIFFERENTIAL CONSTRAINTS FOR THE PROBABILITY DENSITY FUNCTION OF STOCHASTIC SOLUTIONS TO THE WAVE EQUATION International Journal for Uncertainty Quantification | 2014-04-25 | Paper |
New evolution equations for the joint response-excitation probability density function of stochastic solutions to first-order nonlinear PDEs Journal of Computational Physics | 2014-04-22 | Paper |
Conjugate flow action functionals Journal of Mathematical Physics | 2014-04-17 | Paper |
Leakage-Resilient Signatures with Graceful Degradation Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
Continuous non-malleable codes Theory of Cryptography | 2014-02-18 | Paper |
Bounded tamper resilience: how to go beyond the algebraic barrier Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Adaptive discontinuous Galerkin method for response-excitation PDF equations SIAM Journal on Scientific Computing | 2013-10-28 | Paper |
Outsourced pattern matching Automata, Languages, and Programming | 2013-08-07 | Paper |
Rate-limited secure function evaluation: definitions and constructions Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
On the connection between leakage tolerance and adaptive security Public-Key Cryptography – PKC 2013 | 2013-04-19 | Paper |
Tamper-Proof Circuits: How to Trade Leakage for Tamper-Resilience Automata, Languages and Programming | 2011-07-06 | Paper |
Efficient Authentication from Hard Learning Problems Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
A fully symmetric nonlinear biorthogonal decomposition theory for random fields Physica D | 2011-03-08 | Paper |
Leakage-resilient storage Lecture Notes in Computer Science | 2010-09-10 | Paper |
Stochastic bifurcation analysis of Rayleigh-Bénard convection Journal of Fluid Mechanics | 2010-06-30 | Paper |
Convective derivatives and Reynolds transport in curvilinear time-dependent coordinates Journal of Physics A: Mathematical and Theoretical | 2009-04-08 | Paper |
Stochastic low-dimensional modelling of a random laminar wake past a circular cylinder Journal of Fluid Mechanics | 2008-10-24 | Paper |
On proper orthogonal decomposition of randomly perturbed fields with applications to flow past a cylinder and natural convection over a horizontal plate Journal of Fluid Mechanics | 2006-08-24 | Paper |
Gappy data and reconstruction procedures for flow past a cylinder Journal of Fluid Mechanics | 2005-04-23 | Paper |
Tensor approximation of functional differential equations (available as arXiv preprint) | N/A | Paper |