Daniel Wichs, Ph.D.
Affiliations: | 2011 | Computer Science | New York University, New York, NY, United States |
Area:
Computer Science, Applied MathematicsGoogle:
"Daniel Wichs"Parents
Sign in to add mentorYevgeniy Dodis | grad student | 2011 | NYU | |
(Cryptographic Resilience to Continual Information Leakage.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Bitansky N, Nishimaki R, Passelègue A, et al. (2020) From Cryptomania to Obfustopia Through Secret-Key Functional Encryption Journal of Cryptology. 33: 357-405 |
Dziembowski S, Pietrzak K, Wichs D. (2018) Non-Malleable Codes Journal of the Acm. 65: 20 |
Cohen A, Holmgren J, Nishimaki R, et al. (2016) Watermarking cryptographic capabilities Proceedings of the Annual Acm Symposium On Theory of Computing. 19: 1115-1127 |
Krenn S, Pietrzak K, Wadia A, et al. (2016) A counterexample to the chain rule for conditional HILL entropy Computational Complexity. 1-39 |
Dodis Y, Halevi S, Rothblum RD, et al. (2016) Spooky encryption and its applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9816: 93-122 |
Mukherjee P, Wichs D. (2016) Two round multiparty computation Via multi-key FHE Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9666: 735-763 |
Gorbunov S, Vaikuntanathan V, Wichs D. (2015) Leveled fully homomorphic signatures from standard lattices Proceedings of the Annual Acm Symposium On Theory of Computing. 14: 469-477 |
Cash D, Küpçü A, Wichs D. (2015) Dynamic Proofs of Retrievability Via Oblivious RAM Journal of Cryptology |
Faust S, Mukherjee P, Venturi D, et al. (2014) Efficient non-malleable codes and key-derivation for poly-size tampering circuits Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8441: 111-128 |
Dodis Y, Shamir A, Stephens-Davidowitz N, et al. (2014) How to eat your entropy and have it too - Optimal recovery strategies for compromised RNGs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8617: 37-54 |