Publication | Date of Publication | Type |
---|
Functional commitments for all functions, with transparent setup and from SIS | 2023-12-12 | Paper |
Classical and quantum security of elliptic curve VRF, via relative indifferentiability | 2023-10-04 | Paper |
Vector and functional commitments from lattices | 2023-04-13 | Paper |
Constraining and Watermarking PRFs from Milder Assumptions | 2022-10-13 | Paper |
Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography | 2022-10-13 | Paper |
Hardness of bounded distance decoding on lattices in lp norms | 2022-07-21 | Paper |
He gives C-sieves on the CSIDH | 2022-03-23 | Paper |
Lattice (List) Decoding Near Minkowski’s Inequality | 2022-02-17 | Paper |
Outsourcing computation: the minimal refereed mechanism | 2020-06-30 | Paper |
Noninteractive zero knowledge for NP from (Plain) Learning With Errors | 2020-05-20 | Paper |
Algebraically structured LWE. Revisited | 2020-04-30 | Paper |
More efficient commitments from structured lattice assumptions | 2018-10-17 | Paper |
New (and old) proof systems for lattice problems | 2018-05-29 | Paper |
Privately constraining and programming PRFs, the LWE way | 2018-05-29 | Paper |
List-decoding Barnes-Wall lattices | 2017-10-18 | Paper |
Pseudorandomness of ring-LWE for any ring and modulus | 2017-08-17 | Paper |
Optimal Error Correction for Computationally Bounded Noise | 2017-07-27 | Paper |
Multi-key FHE from LWE, Revisited | 2016-12-22 | Paper |
Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE | 2016-10-27 | Paper |
On Adaptively Secure Multiparty Computation with a Short CRS | 2016-10-21 | Paper |
How (Not) to Instantiate Ring-LWE | 2016-10-21 | Paper |
Recovering Short Generators of Principal Ideals in Cyclotomic Rings | 2016-07-15 | Paper |
A Decade of Lattice Cryptography | 2016-05-23 | Paper |
SPRING: Fast Pseudorandom Functions from Rounded Ring Products | 2015-09-18 | Paper |
Completely fair SFE and coalition-safe cheap talk | 2015-08-03 | Paper |
Key-Homomorphic Constrained Pseudorandom Functions | 2015-07-06 | Paper |
Public-key cryptosystems from the worst-case shortest vector problem | 2015-02-04 | Paper |
Lattice Cryptography for the Internet | 2015-01-14 | Paper |
Faster Bootstrapping with Polynomial Error | 2014-08-07 | Paper |
New and Improved Key-Homomorphic Pseudorandom Functions | 2014-08-07 | Paper |
Classical hardness of learning with errors | 2014-08-07 | Paper |
Enumerative Lattice Algorithms in any Norm Via M-ellipsoid Coverings | 2014-07-30 | Paper |
On Ideal Lattices and Learning with Errors over Rings | 2014-02-17 | Paper |
How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE | 2014-01-24 | Paper |
Practical Bootstrapping in Quasilinear Time | 2013-09-02 | Paper |
Hardness of SIS and LWE with Small Parameters | 2013-09-02 | Paper |
A Toolkit for Ring-LWE Cryptography | 2013-05-31 | Paper |
Bonsai trees, or how to delegate a lattice basis | 2013-01-04 | Paper |
Ring Switching in BGV-Style Homomorphic Encryption | 2012-09-25 | Paper |
Circular and KDM Security for Identity-Based Encryption | 2012-07-20 | Paper |
Identity-Based (Lossy) Trapdoor Functions and Applications | 2012-06-29 | Paper |
Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller | 2012-06-29 | Paper |
Pseudorandom Functions and Lattices | 2012-06-29 | Paper |
Generating Shorter Bases for Hard Random Lattices | 2012-04-24 | Paper |
Lossy Trapdoor Functions and Their Applications | 2012-03-15 | Paper |
Bi-Deniable Public-Key Encryption | 2011-08-12 | Paper |
Generating shorter bases for hard random lattices | 2011-05-23 | Paper |
Better Key Sizes (and Attacks) for LWE-Based Encryption | 2011-02-11 | Paper |
An Efficient and Parallel Gaussian Sampler for Lattices | 2010-08-24 | Paper |
On Ideal Lattices and Learning with Errors over Rings | 2010-06-01 | Paper |
Bonsai Trees, or How to Delegate a Lattice Basis | 2010-06-01 | Paper |
Public-Key Encryption Schemes with Auxiliary Inputs | 2010-02-24 | Paper |
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems | 2009-10-20 | Paper |
Some Recent Progress in Lattice-Based Cryptography | 2009-03-03 | Paper |
Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems | 2009-02-10 | Paper |
A Framework for Efficient and Composable Oblivious Transfer | 2009-02-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q3549647 | 2009-01-05 | Paper |
Lossy trapdoor functions and their applications | 2009-01-05 | Paper |
Trapdoors for hard lattices and new cryptographic constructions | 2009-01-05 | Paper |
SWIFFT: A Modest Proposal for FFT Hashing | 2008-09-18 | Paper |
Limits on the hardness of lattice problems in \(\ell_{p}\) norms | 2008-08-20 | Paper |
Theory of Cryptography | 2007-02-12 | Paper |
Theory of Cryptography | 2007-02-12 | Paper |
Theory of Cryptography | 2005-12-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4474183 | 2004-08-04 | Paper |