Publication | Date of Publication | Type |
---|
Additive randomized encodings and their applications | 2024-02-02 | Paper |
Achievable \textsf{CCA2} relaxation for homomorphic encryption | 2023-08-14 | Paper |
Random-index oblivious RAM | 2023-08-14 | Paper |
Generalized pseudorandom secret sharing and efficient straggler-resilient secure computation | 2023-04-13 | Paper |
Random-index PIR and applications | 2023-04-13 | Paper |
Homomorphic Encryption Standard | 2022-11-02 | Paper |
Practical non-interactive publicly verifiable secret sharing with thousands of parties | 2022-08-30 | Paper |
YOSO: You only speak once. Secure MPC with stateless ephemeral roles | 2022-04-22 | Paper |
Homomorphic Encryption | 2022-01-12 | Paper |
Can a public blockchain keep a secret? | 2021-12-01 | Paper |
Round-optimal secure multi-party computation | 2021-07-30 | Paper |
Bootstrapping for helib | 2021-04-07 | Paper |
Homomorphic encryption for finite automata | 2020-05-05 | Paper |
On fully secure MPC with solitary output | 2020-04-30 | Paper |
Compressible FHE with applications to PIR | 2020-04-30 | Paper |
An improved RNS variant of the BFV homomorphic encryption scheme | 2020-01-28 | Paper |
Best possible information-theoretic MPC | 2018-12-06 | Paper |
Round-optimal secure multi-party computation | 2018-09-26 | Paper |
Faster homomorphic linear transformations in HElib | 2018-09-12 | Paper |
MMH: Software message authentication in the Gbit/second rates | 2018-05-09 | Paper |
Non-interactive multiparty computation without correlated randomness | 2018-02-23 | Paper |
Four round secure computation without setup | 2018-01-19 | Paper |
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input | 2018-01-05 | Paper |
Potential function analysis of greedy hot-potato routing | 2017-09-29 | Paper |
Maintaining authenticated communication in the presence of break-ins | 2017-09-29 | Paper |
Cryptanalyses of Candidate Branching Program Obfuscators | 2017-06-23 | Paper |
Spooky Encryption and Its Applications | 2016-11-09 | Paper |
Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits | 2016-07-04 | Paper |
Secure Multiparty Computation with General Interaction Patterns | 2016-04-15 | Paper |
Functional Encryption Without Obfuscation | 2016-04-08 | Paper |
Private Database Access with HE-over-ORAM Architecture | 2016-03-10 | Paper |
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations | 2015-12-10 | Paper |
Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing | 2015-11-11 | Paper |
Bootstrapping for HElib | 2015-09-30 | Paper |
Graph-Induced Multilinear Maps from Lattices | 2015-07-06 | Paper |
Clock synchronization with faults and recoveries (extended abstract) | 2015-03-03 | Paper |
Private approximation of NP-hard functions | 2015-02-27 | Paper |
Optimizing ORAM and Using It Efficiently for Secure Computation | 2014-08-19 | Paper |
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input | 2014-08-07 | Paper |
Algorithms in HElib | 2014-08-07 | Paper |
Fully Homomorphic Encryption without Squashing Using Depth-3 Arithmetic Circuits | 2014-07-30 | Paper |
Garbled RAM Revisited | 2014-05-27 | Paper |
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits | 2014-05-27 | Paper |
Two-Round Secure MPC from Indistinguishability Obfuscation | 2014-02-18 | Paper |
Discrete Gaussian Leftover Hash Lemma over Infinite Domains | 2013-12-10 | Paper |
Attribute-Based Encryption for Circuits from Multilinear Maps | 2013-09-17 | Paper |
Candidate Multilinear Maps from Ideal Lattices | 2013-05-31 | Paper |
Packed Ciphertexts in LWE-Based Homomorphic Encryption | 2013-04-19 | Paper |
Ring Switching in BGV-Style Homomorphic Encryption | 2012-09-25 | Paper |
Homomorphic Evaluation of the AES Circuit | 2012-09-25 | Paper |
Better Bootstrapping in Fully Homomorphic Encryption | 2012-07-20 | Paper |
Fully Homomorphic Encryption with Polylog Overhead | 2012-06-29 | Paper |
Leakage-Tolerant Interactive Protocols | 2012-06-15 | Paper |
Smooth projective hashing and two-message oblivious transfer | 2012-05-23 | Paper |
Program Obfuscation with Leaky Hardware | 2011-12-02 | Paper |
Collision-Free Hashing from Lattice Problems | 2011-08-19 | Paper |
Secure Computation on the Web: Computing without Simultaneous Interaction | 2011-08-12 | Paper |
Implementing Gentry’s Fully-Homomorphic Encryption Scheme | 2011-05-27 | Paper |
After-the-Fact Leakage in Public-Key Encryption | 2011-05-19 | Paper |
One-Pass HMQV and Asymmetric Key-Wrapping | 2011-03-15 | Paper |
The random oracle methodology, revisited | 2011-02-01 | Paper |
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits | 2010-08-24 | Paper |
Fully Homomorphic Encryption over the Integers | 2010-06-01 | Paper |
A Simple BGN-Type Cryptosystem from LWE | 2010-06-01 | Paper |
More on Key Wrapping | 2009-12-09 | Paper |
Theory of Cryptography | 2009-05-14 | Paper |
Topics in Cryptology – CT-RSA 2004 | 2009-05-07 | Paper |
Invertible Universal Hashing and the TET Encryption Mode | 2009-03-10 | Paper |
Hierarchical Identity Based Encryption with Polynomially Many Levels | 2009-03-03 | Paper |
Circular-Secure Encryption from Decision Diffie-Hellman | 2009-02-10 | Paper |
Universally Composable Password-Based Key Exchange | 2008-05-06 | Paper |
Cryptanalysis of ISO/IEC 9796-1 | 2008-04-16 | Paper |
Threshold RSA for Dynamic and Ad-Hoc Groups | 2008-04-15 | Paper |
On Seed-Incompressible Functions | 2008-03-05 | Paper |
Degradation and Amplification of Computational Hardness | 2008-03-05 | Paper |
Advances in Cryptology - CRYPTO 2003 | 2007-11-28 | Paper |
Chosen‐Ciphertext Security from Identity‐Based Encryption | 2007-10-22 | Paper |
Advances in Cryptology - EUROCRYPT 2004 | 2007-09-25 | Paper |
Strengthening Digital Signatures Via Randomized Hashing | 2007-09-04 | Paper |
Mitigating Dictionary Attacks on Password-Protected Local Storage | 2007-09-04 | Paper |
A forward-secure public-key encryption scheme | 2007-08-20 | Paper |
Topics in Cryptology – CT-RSA 2006 | 2007-02-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q3374909 | 2006-03-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3374929 | 2006-03-01 | Paper |
Progress in Cryptology - INDOCRYPT 2004 | 2005-12-22 | Paper |
Theory of Cryptography | 2005-12-07 | Paper |
Theory of Cryptography | 2005-12-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q3046355 | 2004-08-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q4474164 | 2004-08-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4434880 | 2003-11-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4409140 | 2003-06-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4785465 | 2003-02-04 | Paper |
https://portal.mardi4nfdi.de/entity/Q4542539 | 2002-09-24 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536797 | 2002-07-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4941857 | 2000-07-26 | Paper |
Efficient commitment schemes with bounded sender and unbounded receiver | 2000-05-22 | Paper |
Maintaining authenticated communication in the presence of break-ins | 2000-05-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4249337 | 1999-06-17 | Paper |
Secure Hash-and-Sign Signatures Without the Random Oracle | 1999-01-01 | Paper |
Potential function analysis of greedy hot-potato routing | 1998-08-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q4364546 | 1998-06-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4364545 | 1998-01-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4343425 | 1997-11-23 | Paper |