Chris Peikert

From MaRDI portal
Person:537917

Available identifiers

zbMath Open peikert.chrisWikidataQ21681005 ScholiaQ21681005MaRDI QIDQ537917

List of research outcomes

PublicationDate of PublicationType
Functional commitments for all functions, with transparent setup and from SIS2023-12-12Paper
Classical and quantum security of elliptic curve VRF, via relative indifferentiability2023-10-04Paper
Vector and functional commitments from lattices2023-04-13Paper
Constraining and Watermarking PRFs from Milder Assumptions2022-10-13Paper
Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography2022-10-13Paper
Hardness of bounded distance decoding on lattices in lp norms2022-07-21Paper
He gives C-sieves on the CSIDH2022-03-23Paper
Lattice (List) Decoding Near Minkowski’s Inequality2022-02-17Paper
Outsourcing computation: the minimal refereed mechanism2020-06-30Paper
Noninteractive zero knowledge for NP from (Plain) Learning With Errors2020-05-20Paper
Algebraically structured LWE. Revisited2020-04-30Paper
More efficient commitments from structured lattice assumptions2018-10-17Paper
New (and old) proof systems for lattice problems2018-05-29Paper
Privately constraining and programming PRFs, the LWE way2018-05-29Paper
List-decoding Barnes-Wall lattices2017-10-18Paper
Pseudorandomness of ring-LWE for any ring and modulus2017-08-17Paper
Optimal Error Correction for Computationally Bounded Noise2017-07-27Paper
Multi-key FHE from LWE, Revisited2016-12-22Paper
Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE2016-10-27Paper
On Adaptively Secure Multiparty Computation with a Short CRS2016-10-21Paper
How (Not) to Instantiate Ring-LWE2016-10-21Paper
Recovering Short Generators of Principal Ideals in Cyclotomic Rings2016-07-15Paper
A Decade of Lattice Cryptography2016-05-23Paper
SPRING: Fast Pseudorandom Functions from Rounded Ring Products2015-09-18Paper
Completely fair SFE and coalition-safe cheap talk2015-08-03Paper
Key-Homomorphic Constrained Pseudorandom Functions2015-07-06Paper
Public-key cryptosystems from the worst-case shortest vector problem2015-02-04Paper
Lattice Cryptography for the Internet2015-01-14Paper
Faster Bootstrapping with Polynomial Error2014-08-07Paper
New and Improved Key-Homomorphic Pseudorandom Functions2014-08-07Paper
Classical hardness of learning with errors2014-08-07Paper
Enumerative Lattice Algorithms in any Norm Via M-ellipsoid Coverings2014-07-30Paper
On Ideal Lattices and Learning with Errors over Rings2014-02-17Paper
How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE2014-01-24Paper
Practical Bootstrapping in Quasilinear Time2013-09-02Paper
Hardness of SIS and LWE with Small Parameters2013-09-02Paper
A Toolkit for Ring-LWE Cryptography2013-05-31Paper
Bonsai trees, or how to delegate a lattice basis2013-01-04Paper
Ring Switching in BGV-Style Homomorphic Encryption2012-09-25Paper
Circular and KDM Security for Identity-Based Encryption2012-07-20Paper
Identity-Based (Lossy) Trapdoor Functions and Applications2012-06-29Paper
Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller2012-06-29Paper
Pseudorandom Functions and Lattices2012-06-29Paper
Generating Shorter Bases for Hard Random Lattices2012-04-24Paper
Lossy Trapdoor Functions and Their Applications2012-03-15Paper
Bi-Deniable Public-Key Encryption2011-08-12Paper
Generating shorter bases for hard random lattices2011-05-23Paper
Better Key Sizes (and Attacks) for LWE-Based Encryption2011-02-11Paper
An Efficient and Parallel Gaussian Sampler for Lattices2010-08-24Paper
On Ideal Lattices and Learning with Errors over Rings2010-06-01Paper
Bonsai Trees, or How to Delegate a Lattice Basis2010-06-01Paper
Public-Key Encryption Schemes with Auxiliary Inputs2010-02-24Paper
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems2009-10-20Paper
Some Recent Progress in Lattice-Based Cryptography2009-03-03Paper
Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems2009-02-10Paper
A Framework for Efficient and Composable Oblivious Transfer2009-02-10Paper
https://portal.mardi4nfdi.de/entity/Q35496472009-01-05Paper
Lossy trapdoor functions and their applications2009-01-05Paper
Trapdoors for hard lattices and new cryptographic constructions2009-01-05Paper
SWIFFT: A Modest Proposal for FFT Hashing2008-09-18Paper
Limits on the hardness of lattice problems in \(\ell_{p}\) norms2008-08-20Paper
Theory of Cryptography2007-02-12Paper
Theory of Cryptography2007-02-12Paper
Theory of Cryptography2005-12-07Paper
https://portal.mardi4nfdi.de/entity/Q44741832004-08-04Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Chris Peikert