Year |
Citation |
Score |
2020 |
Bitansky N, Nishimaki R, Passelègue A, Wichs D. From Cryptomania to Obfustopia Through Secret-Key Functional Encryption Journal of Cryptology. 33: 357-405. DOI: 10.1007/S00145-019-09337-9 |
0.499 |
|
2018 |
Dziembowski S, Pietrzak K, Wichs D. Non-Malleable Codes Journal of the Acm. 65: 20. DOI: 10.1145/3178432 |
0.361 |
|
2016 |
Cohen A, Holmgren J, Nishimaki R, Vaikuntanathan V, Wichs D. Watermarking cryptographic capabilities Proceedings of the Annual Acm Symposium On Theory of Computing. 19: 1115-1127. DOI: 10.1137/18M1164834 |
0.323 |
|
2016 |
Krenn S, Pietrzak K, Wadia A, Wichs D. A counterexample to the chain rule for conditional HILL entropy Computational Complexity. 1-39. DOI: 10.1007/S00037-015-0120-9 |
0.311 |
|
2016 |
Dodis Y, Halevi S, Rothblum RD, Wichs D. Spooky encryption and its applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9816: 93-122. DOI: 10.1007/978-3-662-53015-3_4 |
0.656 |
|
2016 |
Mukherjee P, Wichs D. Two round multiparty computation Via multi-key FHE Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9666: 735-763. DOI: 10.1007/978-3-662-49896-5_26 |
0.311 |
|
2015 |
Gorbunov S, Vaikuntanathan V, Wichs D. Leveled fully homomorphic signatures from standard lattices Proceedings of the Annual Acm Symposium On Theory of Computing. 14: 469-477. DOI: 10.1145/2746539.2746576 |
0.323 |
|
2015 |
Cash D, Küpçü A, Wichs D. Dynamic Proofs of Retrievability Via Oblivious RAM Journal of Cryptology. DOI: 10.1007/S00145-015-9216-2 |
0.327 |
|
2014 |
Faust S, Mukherjee P, Venturi D, Wichs D. Efficient non-malleable codes and key-derivation for poly-size tampering circuits Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8441: 111-128. DOI: 10.1109/Tit.2016.2613919 |
0.32 |
|
2014 |
Dodis Y, Shamir A, Stephens-Davidowitz N, Wichs D. How to eat your entropy and have it too - Optimal recovery strategies for compromised RNGs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8617: 37-54. DOI: 10.1007/S00453-016-0239-3 |
0.643 |
|
2014 |
Dodis Y, Pietrzak K, Wichs D. Key derivation without entropy waste Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8441: 93-110. DOI: 10.1007/978-3-642-55220-5_6 |
0.533 |
|
2013 |
Dodis Y, Pointcheval D, Ruhault S, Vergniaud D, Wichs D. Security analysis of pseudo-random number generators with input: /dev/random is not robust Proceedings of the Acm Conference On Computer and Communications Security. 647-658. DOI: 10.1145/2508859.2516653 |
0.653 |
|
2013 |
Hazay C, López-Alt A, Wee H, Wichs D. Leakage-resilient cryptography from minimal assumptions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7881: 160-176. DOI: 10.1007/S00145-015-9200-X |
0.659 |
|
2013 |
Boyle E, Segev G, Wichs D. Fully leakage-resilient signatures Journal of Cryptology. 26: 513-558. DOI: 10.1007/S00145-012-9136-3 |
0.521 |
|
2013 |
Agrawal S, Dodis Y, Vaikuntanathan V, Wichs D. On continual leakage of discrete log representations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8270: 401-420. DOI: 10.1007/978-3-642-42045-0_21 |
0.534 |
|
2013 |
Gennaro R, Wichs D. Fully homomorphic message authenticators Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8270: 301-320. DOI: 10.1007/978-3-642-42045-0_16 |
0.31 |
|
2013 |
Alwen J, Krenn S, Pietrzak K, Wichs D. Learning with rounding, revisited: New reduction, properties and applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8042: 57-74. DOI: 10.1007/978-3-642-40041-4_4 |
0.644 |
|
2012 |
Asharov G, Jain A, López-Alt A, Tromer E, Vaikuntanathan V, Wichs D. Multiparty computation with low communication, computation and interaction via threshold FHE Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7237: 483-501. DOI: 10.1007/978-3-642-29011-4_29 |
0.359 |
|
2012 |
Dodis Y, Kiltz E, Pietrzak K, Wichs D. Message authentication, revisited Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7237: 355-374. DOI: 10.1007/978-3-642-29011-4_22 |
0.613 |
|
2012 |
Dodis Y, Jain A, Moran T, Wichs D. Counterexamples to hardness amplification beyond negligible Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7194: 476-493. DOI: 10.1007/978-3-642-28914-9_27 |
0.494 |
|
2011 |
Gentry C, Wichs D. Separating succinct non-interactive arguments from all falsifiable assumptions Proceedings of the Annual Acm Symposium On Theory of Computing. 99-108. DOI: 10.1145/1993636.1993651 |
0.305 |
|
2011 |
Dodis Y, Lewko A, Waters B, Wichs D. Storing secrets on continually leaky devices Proceedings - Annual Ieee Symposium On Foundations of Computer Science, Focs. 688-697. DOI: 10.1109/FOCS.2011.35 |
0.613 |
|
2010 |
Dodis Y, Haralambiev K, López-Alt A, Wichs D. Cryptography against continuous memory attacks Proceedings - Annual Ieee Symposium On Foundations of Computer Science, Focs. 511-520. DOI: 10.1109/FOCS.2010.56 |
0.536 |
|
2010 |
Dodis Y, Haralambiev K, López-Alt A, Wichs D. Efficient public-key cryptography in the presence of key leakage Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6477: 613-631. DOI: 10.1007/978-3-642-17373-8_35 |
0.611 |
|
2010 |
Alwen J, Dodis Y, Wichs D. Survey: Leakage resilience and the bounded retrieval model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5973: 1-18. DOI: 10.1007/978-3-642-14496-7_1 |
0.734 |
|
2010 |
Alwen J, Dodis Y, Naor M, Segev G, Walfish S, Wichs D. Public-key encryption in the bounded-retrieval model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6110: 113-134. DOI: 10.1007/978-3-642-13190-5_6 |
0.748 |
|
2010 |
Canetti R, Tauman Kalai Y, Varia M, Wichs D. On symmetric encryption and point obfuscation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5978: 52-71. DOI: 10.1007/978-3-642-11799-2_4 |
0.394 |
|
2009 |
Dodis Y, Wichs D. Non-malleable extractors and symmetric key cryptography from weak secrets Proceedings of the Annual Acm Symposium On Theory of Computing. 601-610. DOI: 10.1145/1536414.1536496 |
0.567 |
|
2009 |
Alwen J, Dodis Y, Wichs D. Leakage-resilient public-key cryptography in the bounded-retrieval model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5677: 36-54. DOI: 10.1007/978-3-642-03356-8_3 |
0.772 |
|
2009 |
Dodis Y, Vadhan S, Wichs D. Proofs of Retrievability via Hardness Amplification Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5444: 109-127. DOI: 10.1007/978-3-642-00457-5_8 |
0.645 |
|
2008 |
Cramer R, Dodis Y, Fehr S, Padró C, Wichs D. Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4965: 471-488. DOI: 10.1007/978-3-540-78967-3_27 |
0.627 |
|
Show low-probability matches. |