Daniel Wichs
Daniel Wichs
Northeastern University, Associate Professor
Verifierad e-postadress på ccs.neu.edu - Startsida
Titel
Citeras av
Citeras av
År
Proofs of retrievability via hardness amplification
Y Dodis, S Vadhan, D Wichs
Theory of Cryptography Conference, 109-127, 2009
4682009
Separating succinct non-interactive arguments from all falsifiable assumptions
C Gentry, D Wichs
Proceedings of the forty-third annual ACM symposium on Theory of computing …, 2011
3362011
Leakage-resilient public-key cryptography in the bounded-retrieval model
J Alwen, Y Dodis, D Wichs
Annual International Cryptology Conference, 36-54, 2009
3152009
Multiparty computation with low communication, computation and interaction via threshold FHE
G Asharov, A Jain, A López-Alt, E Tromer, V Vaikuntanathan, D Wichs
Annual International Conference on the Theory and Applications of …, 2012
2992012
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
R Cramer, Y Dodis, S Fehr, C Padró, D Wichs
Annual International Conference on the Theory and Applications of …, 2008
2772008
Cryptography against continuous memory attacks
Y Dodis, K Haralambiev, A López-Alt, D Wichs
2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 511-520, 2010
2402010
Public-key encryption in the bounded-retrieval model
J Alwen, Y Dodis, M Naor, G Segev, S Walfish, D Wichs
Annual International Conference on the Theory and Applications of …, 2010
2202010
Dynamic proofs of retrievability via oblivious RAM
D Cash, A Küpçü, D Wichs
Journal of Cryptology 30 (1), 22-57, 2017
2182017
Non-malleable codes
S Dziembowski, K Pietrzak, D Wichs
Journal of the ACM (JACM) 65 (4), 1-32, 2018
2142018
Optimizing ORAM and using it efficiently for secure computation
C Gentry, KA Goldman, S Halevi, C Julta, M Raykova, D Wichs
International Symposium on Privacy Enhancing Technologies Symposium, 1-18, 2013
1922013
Two round multiparty computation via multi-key FHE
P Mukherjee, D Wichs
Annual International Conference on the Theory and Applications of …, 2016
1902016
Efficient public-key cryptography in the presence of key leakage
Y Dodis, K Haralambiev, A López-Alt, D Wichs
International Conference on the Theory and Application of Cryptology and …, 2010
1802010
Leveled fully homomorphic signatures from standard lattices
S Gorbunov, V Vaikuntanathan, D Wichs
Proceedings of the forty-seventh annual ACM symposium on Theory of computing …, 2015
1512015
Fully homomorphic message authenticators
R Gennaro, D Wichs
International Conference on the Theory and Application of Cryptology and …, 2013
1412013
Non-malleable extractors and symmetric key cryptography from weak secrets
Y Dodis, D Wichs
Proceedings of the forty-first annual ACM symposium on Theory of computing …, 2009
1382009
Onion ORAM: A constant bandwidth blowup oblivious RAM
S Devadas, M van Dijk, CW Fletcher, L Ren, E Shi, D Wichs
Theory of Cryptography Conference, 145-174, 2016
1332016
Security analysis of pseudo-random number generators with input: /dev/random is not robust
Y Dodis, D Pointcheval, S Ruhault, D Vergniaud, D Wichs
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
1242013
Learning with rounding, revisited
J Alwen, S Krenn, K Pietrzak, D Wichs
Annual Cryptology Conference, 57-74, 2013
1242013
Garbled RAM revisited
C Gentry, S Halevi, S Lu, R Ostrovsky, M Raykova, D Wichs
Annual International Conference on the Theory and Applications of …, 2014
1072014
On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input
S Garg, C Gentry, S Halevi, D Wichs
Algorithmica 79 (4), 1353-1373, 2017
1032017
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20