Divesh Aggarwal

From MaRDI portal
(Redirected from Person:477695)


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Quantum measurement adversary
IEEE Transactions on Information Theory
2024-07-21Paper
Quantum secure non-malleable codes in the split-state model
IEEE Transactions on Information Theory
2024-07-21Paper
Lattice problems beyond polynomial time
 
2024-05-08Paper
scientific article; zbMATH DE number 7829234 (Why is no real title available?)
 
2024-04-09Paper
Extractors: low entropy requirements colliding with non-malleability
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
scientific article; zbMATH DE number 7788447 (Why is no real title available?)
 
2024-01-15Paper
scientific article; zbMATH DE number 7788483 (Why is no real title available?)
 
2024-01-15Paper
Algebraic restriction codes and their applications
Algorithmica
2023-12-13Paper
Rate one-third non-malleable codes
Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing
2023-12-08Paper
Extractor Lower Bounds, Revisited
 
2023-10-31Paper
On secret sharing, randomness, and random-less reductions for secret sharing
Theory of Cryptography
2023-08-14Paper
Slide reduction, revisited -- filling the gaps in SVP approximation
 
2022-11-09Paper
Privacy Amplification With Tamperable Memory via Non-Malleable Two-Source Extractors
IEEE Transactions on Information Theory
2022-08-19Paper
scientific article; zbMATH DE number 7561389 (Why is no real title available?)
 
2022-07-21Paper
A \(2^{n/2}\)-time algorithm for \(\sqrt{n} \)-SVP and \(\sqrt{n} \)-Hermite SVP, and an improved time-approximation tradeoff for (H)SVP
 
2021-12-08Paper
How to extract useful randomness from unreliable sources
 
2021-12-01Paper
A note on the concrete hardness of the shortest independent vector in lattices
Information Processing Letters
2021-03-11Paper
A new public-key cryptosystem via Mersenne numbers
 
2020-06-30Paper
Stronger leakage-resilient and non-malleable secret sharing schemes for general access structures
 
2020-03-09Paper
A quantum-proof non-malleable extractor. With application to privacy amplification against active quantum adversaries
 
2020-02-06Paper
Continuous non-malleable codes in the 8-split-state model
 
2020-02-04Paper
Just take the average! An embarrassingly simple \(2^n\)-time algorithm for SVP (and CVP)
 
2019-10-25Paper
(Gap/S)ETH hardness of SVP
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing
2019-08-22Paper
An improved constant in Banaszczyk's transference theorem
 
2019-07-21Paper
Non-Malleable Codes from Additive Combinatorics
SIAM Journal on Computing
2018-04-26Paper
Inception makes non-malleable codes stronger
 
2018-01-19Paper
Breaking RSA Generically Is Equivalent to Factoring
IEEE Transactions on Information Theory
2017-04-28Paper
A note on discrete Gaussian combinations of lattice vectors
Chicago Journal of Theoretical Computer Science
2016-08-16Paper
Improved hardness results for unique shortest vector problem
Information Processing Letters
2016-07-07Paper
Optimal computational split-state non-malleable codes
Theory of Cryptography
2016-04-08Paper
Non-malleable reductions and applications
Proceedings of the forty-seventh annual ACM symposium on Theory of Computing
2015-08-21Paper
Solving the shortest vector problem in \(2^n\) time using discrete Gaussian sampling (extended abstract)
Proceedings of the forty-seventh annual ACM symposium on Theory of Computing
2015-08-21Paper
Leakage-resilient non-malleable codes
Theory of Cryptography
2015-07-06Paper
Non-malleable codes from additive combinatorics (extended abstract)
Proceedings of the forty-sixth annual ACM symposium on Theory of computing
2015-06-26Paper
Affine-evasive sets modulo a prime
Information Processing Letters
2014-12-09Paper
Amplifying Privacy in Privacy Amplification
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy
Lecture Notes in Computer Science
2011-12-02Paper
Breaking RSA Generically Is Equivalent to Factoring
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
Algorithms on Graphs with Small Dominating Targets
Algorithms and Computation
2008-04-24Paper
Graph-Theoretic Concepts in Computer Science
Lecture Notes in Computer Science
2006-11-01Paper


Research outcomes over time


This page was built for person: Divesh Aggarwal