Daniel Wichs, Ph.D.

Affiliations: 
2011 Computer Science New York University, New York, NY, United States 
Area:
Computer Science, Applied Mathematics
Google:
"Daniel Wichs"

Parents

Sign in to add mentor
Yevgeniy Dodis grad student 2011 NYU
 (Cryptographic Resilience to Continual Information Leakage.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Bitansky N, Nishimaki R, Passelègue A, et al. (2020) From Cryptomania to Obfustopia Through Secret-Key Functional Encryption Journal of Cryptology. 33: 357-405
Dziembowski S, Pietrzak K, Wichs D. (2018) Non-Malleable Codes Journal of the Acm. 65: 20
Cohen A, Holmgren J, Nishimaki R, et al. (2016) Watermarking cryptographic capabilities Proceedings of the Annual Acm Symposium On Theory of Computing. 19: 1115-1127
Krenn S, Pietrzak K, Wadia A, et al. (2016) A counterexample to the chain rule for conditional HILL entropy Computational Complexity. 1-39
Dodis Y, Halevi S, Rothblum RD, et al. (2016) Spooky encryption and its applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9816: 93-122
Mukherjee P, Wichs D. (2016) Two round multiparty computation Via multi-key FHE Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9666: 735-763
Gorbunov S, Vaikuntanathan V, Wichs D. (2015) Leveled fully homomorphic signatures from standard lattices Proceedings of the Annual Acm Symposium On Theory of Computing. 14: 469-477
Cash D, Küpçü A, Wichs D. (2015) Dynamic Proofs of Retrievability Via Oblivious RAM Journal of Cryptology
Faust S, Mukherjee P, Venturi D, et al. (2014) Efficient non-malleable codes and key-derivation for poly-size tampering circuits Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8441: 111-128
Dodis Y, Shamir A, Stephens-Davidowitz N, et al. (2014) How to eat your entropy and have it too - Optimal recovery strategies for compromised RNGs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8617: 37-54
See more...