Chris Peikert

From MaRDI portal
Person:537917

Available identifiers

zbMath Open peikert.chrisDBLP66/870WikidataQ21681005 ScholiaQ21681005MaRDI QIDQ537917

List of research outcomes





PublicationDate of PublicationType
Hardness of the (approximate) shortest vector problem: a simple proof via Reed-Solomon codes2025-01-14Paper
Cryptanalysis of lattice-based sequentiality assumptions and proofs of sequential work2024-12-13Paper
Algebraically structured LWE, revisited2024-08-30Paper
Functional commitments for all functions, with transparent setup and from SIS2023-12-12Paper
Classical and quantum security of elliptic curve VRF, via relative indifferentiability2023-10-04Paper
Vector and functional commitments from lattices2023-04-13Paper
Improved discrete Gaussian and Subgaussian analysis for lattice cryptography2022-10-13Paper
Constraining and watermarking PRFs from milder assumptions2022-10-13Paper
Hardness of bounded distance decoding on lattices in lp norms2022-07-21Paper
He gives C-sieves on the CSIDH2022-03-23Paper
Lattice (List) Decoding Near Minkowski’s Inequality2022-02-17Paper
Outsourcing computation: the minimal refereed mechanism2020-06-30Paper
Noninteractive zero knowledge for NP from (Plain) Learning With Errors2020-05-20Paper
Algebraically structured LWE. Revisited2020-04-30Paper
More efficient commitments from structured lattice assumptions2018-10-17Paper
Privately constraining and programming PRFs, the LWE way2018-05-29Paper
New (and old) proof systems for lattice problems2018-05-29Paper
List-decoding Barnes-Wall lattices2017-10-18Paper
Pseudorandomness of ring-LWE for any ring and modulus2017-08-17Paper
Optimal Error Correction for Computationally Bounded Noise2017-07-27Paper
Multi-key FHE from LWE, revisited2016-12-22Paper
Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE2016-10-27Paper
How (not) to instantiate ring-LWE2016-10-21Paper
On Adaptively Secure Multiparty Computation with a Short CRS2016-10-21Paper
Recovering short generators of principal ideals in cyclotomic rings2016-07-15Paper
A decade of lattice cryptography2016-05-23Paper
SPRING: Fast Pseudorandom Functions from Rounded Ring Products2015-09-18Paper
Completely fair SFE and coalition-safe cheap talk2015-08-03Paper
Key-homomorphic constrained pseudorandom functions2015-07-06Paper
Public-key cryptosystems from the worst-case shortest vector problem2015-02-04Paper
Lattice cryptography for the internet2015-01-14Paper
Classical hardness of learning with errors2014-08-07Paper
New and improved key-homomorphic pseudorandom functions2014-08-07Paper
Faster Bootstrapping with Polynomial Error2014-08-07Paper
Enumerative Lattice Algorithms in any Norm Via M-ellipsoid Coverings2014-07-30Paper
On ideal lattices and learning with errors over rings2014-02-17Paper
How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE2014-01-24Paper
Hardness of SIS and LWE with small parameters2013-09-02Paper
Practical bootstrapping in quasilinear time2013-09-02Paper
A toolkit for ring-LWE cryptography2013-05-31Paper
Bonsai trees, or how to delegate a lattice basis2013-01-04Paper
Ring switching in BGV-style homomorphic encryption2012-09-25Paper
Circular and KDM security for identity-based encryption2012-07-20Paper
Trapdoors for lattices: simpler, tighter, faster, smaller2012-06-29Paper
Pseudorandom functions and lattices2012-06-29Paper
Identity-based (lossy) trapdoor functions and applications2012-06-29Paper
Generating shorter bases for hard random lattices2012-04-24Paper
Lossy Trapdoor Functions and Their Applications2012-03-15Paper
Bi-deniable public-key encryption2011-08-12Paper
Generating shorter bases for hard random lattices2011-05-23Paper
Better key sizes (and attacks) for LWE-based encryption2011-02-11Paper
An efficient and parallel Gaussian sampler for lattices2010-08-24Paper
On ideal lattices and learning with errors over rings2010-06-01Paper
Bonsai trees, or how to delegate a lattice basis2010-06-01Paper
Public-key encryption schemes with auxiliary inputs2010-02-24Paper
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems2009-10-20Paper
Some Recent Progress in Lattice-Based Cryptography2009-03-03Paper
A Framework for Efficient and Composable Oblivious Transfer2009-02-10Paper
Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems2009-02-10Paper
Trapdoors for hard lattices and new cryptographic constructions2009-01-05Paper
Lossy trapdoor functions and their applications2009-01-05Paper
https://portal.mardi4nfdi.de/entity/Q35496472009-01-05Paper
SWIFFT: A Modest Proposal for FFT Hashing2008-09-18Paper
Limits on the hardness of lattice problems in \(\ell_{p}\) norms2008-08-20Paper
Theory of Cryptography2007-02-12Paper
Theory of Cryptography2007-02-12Paper
Theory of Cryptography2005-12-07Paper
https://portal.mardi4nfdi.de/entity/Q44741832004-08-04Paper

Research outcomes over time

This page was built for person: Chris Peikert