Publication | Date of Publication | Type |
---|
Non-interactive universal arguments | 2024-02-02 | Paper |
PPAD is as hard as LWE and iterated squaring | 2023-08-14 | Paper |
Statistically sender-private OT from LPN and derandomization | 2023-06-30 | Paper |
Constructive post-quantum reductions | 2023-06-30 | Paper |
Post-quantum resettably-sound zero knowledge | 2023-03-31 | Paper |
Classical binding for quantum commitments | 2023-03-31 | Paper |
https://portal.mardi4nfdi.de/entity/Q5875699 | 2023-02-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q5875726 | 2023-02-03 | Paper |
Non-malleable commitments against quantum attacks | 2022-08-30 | Paper |
A note on perfect correctness by derandomization | 2022-06-16 | Paper |
Succinct non-interactive arguments via linear interactive proofs | 2022-05-10 | Paper |
Weak Zero-Knowledge beyond the Black-Box Barrier | 2022-02-08 | Paper |
Characterizing deterministic-prover zero knowledge | 2021-12-01 | Paper |
Weakly extractable one-way functions | 2021-12-01 | Paper |
Structure Versus Hardness Through the Obfuscation Lens | 2021-02-08 | Paper |
Post-quantum zero knowledge in constant rounds | 2021-01-19 | Paper |
On the complexity of collision resistant hash functions: new and old black-box separations | 2020-04-30 | Paper |
From cryptomania to obfustopia through secret-key functional encryption | 2020-04-28 | Paper |
Verifiable random functions from non-interactive witness-indistinguishable proofs | 2020-04-28 | Paper |
On round optimal statistical zero knowledge arguments | 2020-03-09 | Paper |
Distributional collision resistance beyond one-way functions | 2020-02-04 | Paper |
Weak zero-knowledge beyond the black-box barrier | 2020-01-30 | Paper |
Multi-collision resistance: a paradigm for keyless hash functions | 2019-08-22 | Paper |
Indistinguishability Obfuscation from Functional Encryption | 2019-02-25 | Paper |
One-message zero knowledge and non-malleable commitments | 2018-12-11 | Paper |
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings | 2018-07-04 | Paper |
The hunting of the SNARK | 2018-02-15 | Paper |
Verifiable random functions from non-interactive witness-indistinguishable proofs | 2018-01-19 | Paper |
On virtual grey box obfuscation for general circuits | 2018-01-05 | Paper |
Structure vs. hardness through the obfuscation lens | 2017-11-03 | Paper |
A Note on Perfect Correctness by Derandomization | 2017-06-13 | Paper |
On Removing Graded Encodings from Functional Encryption | 2017-06-13 | Paper |
From Cryptomania to Obfustopia Through Secret-Key Functional Encryption | 2016-12-22 | Paper |
3-Message Zero Knowledge Against Human Ignorance | 2016-12-21 | Paper |
On the Existence of Extractable One-Way Functions | 2016-10-28 | Paper |
From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again | 2016-10-07 | Paper |
Time-Lock Puzzles from Randomized Encodings | 2016-04-15 | Paper |
Indistinguishability Obfuscation: From Approximate to Exact | 2016-03-23 | Paper |
Perfect Structure on the Edge of Chaos | 2016-03-23 | Paper |
On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation | 2015-11-04 | Paper |
Succinct Randomized Encodings and their Applications | 2015-08-21 | Paper |
ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation | 2015-07-06 | Paper |
On the existence of extractable one-way functions | 2015-06-26 | Paper |
On strong simulation and composable point obfuscation | 2014-09-25 | Paper |
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator | 2014-08-07 | Paper |
On Virtual Grey Box Obfuscation for General Circuits | 2014-08-07 | Paper |
Leakage-Tolerant Computation with Input-Independent Preprocessing | 2014-08-07 | Paper |
Recursive composition and bootstrapping for SNARKS and proof-carrying data | 2014-08-07 | Paper |
On the impossibility of approximate obfuscation and applications to resettable cryptography | 2014-08-07 | Paper |
Obfuscation for Evasive Functions | 2014-02-18 | Paper |
Why “Fiat-Shamir for Proofs” Lacks a Proof | 2013-03-18 | Paper |
Succinct Non-interactive Arguments via Linear Interactive Proofs | 2013-03-18 | Paper |
Succinct Arguments from Multi-prover Interactive Proofs and Their Efficiency Benefits | 2012-09-25 | Paper |
Point Obfuscation and 3-Round Zero-Knowledge | 2012-06-15 | Paper |
Leakage-Tolerant Interactive Protocols | 2012-06-15 | Paper |
Program Obfuscation with Leaky Hardware | 2011-12-02 | Paper |
On Strong Simulation and Composable Point Obfuscation | 2010-08-24 | Paper |