Daniel Wichs, Ph.D. - Publications

Affiliations: 
2011 Computer Science New York University, New York, NY, United States 
Area:
Computer Science, Applied Mathematics

31 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Bitansky N, Nishimaki R, Passelègue A, Wichs D. From Cryptomania to Obfustopia Through Secret-Key Functional Encryption Journal of Cryptology. 33: 357-405. DOI: 10.1007/S00145-019-09337-9  0.499
2018 Dziembowski S, Pietrzak K, Wichs D. Non-Malleable Codes Journal of the Acm. 65: 20. DOI: 10.1145/3178432  0.361
2016 Cohen A, Holmgren J, Nishimaki R, Vaikuntanathan V, Wichs D. Watermarking cryptographic capabilities Proceedings of the Annual Acm Symposium On Theory of Computing. 19: 1115-1127. DOI: 10.1137/18M1164834  0.323
2016 Krenn S, Pietrzak K, Wadia A, Wichs D. A counterexample to the chain rule for conditional HILL entropy Computational Complexity. 1-39. DOI: 10.1007/S00037-015-0120-9  0.311
2016 Dodis Y, Halevi S, Rothblum RD, Wichs D. Spooky encryption and its applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9816: 93-122. DOI: 10.1007/978-3-662-53015-3_4  0.656
2016 Mukherjee P, Wichs D. Two round multiparty computation Via multi-key FHE Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9666: 735-763. DOI: 10.1007/978-3-662-49896-5_26  0.311
2015 Gorbunov S, Vaikuntanathan V, Wichs D. Leveled fully homomorphic signatures from standard lattices Proceedings of the Annual Acm Symposium On Theory of Computing. 14: 469-477. DOI: 10.1145/2746539.2746576  0.323
2015 Cash D, Küpçü A, Wichs D. Dynamic Proofs of Retrievability Via Oblivious RAM Journal of Cryptology. DOI: 10.1007/S00145-015-9216-2  0.327
2014 Faust S, Mukherjee P, Venturi D, Wichs D. Efficient non-malleable codes and key-derivation for poly-size tampering circuits Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8441: 111-128. DOI: 10.1109/Tit.2016.2613919  0.32
2014 Dodis Y, Shamir A, Stephens-Davidowitz N, Wichs D. How to eat your entropy and have it too - Optimal recovery strategies for compromised RNGs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8617: 37-54. DOI: 10.1007/S00453-016-0239-3  0.643
2014 Dodis Y, Pietrzak K, Wichs D. Key derivation without entropy waste Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8441: 93-110. DOI: 10.1007/978-3-642-55220-5_6  0.533
2013 Dodis Y, Pointcheval D, Ruhault S, Vergniaud D, Wichs D. Security analysis of pseudo-random number generators with input: /dev/random is not robust Proceedings of the Acm Conference On Computer and Communications Security. 647-658. DOI: 10.1145/2508859.2516653  0.653
2013 Hazay C, López-Alt A, Wee H, Wichs D. Leakage-resilient cryptography from minimal assumptions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7881: 160-176. DOI: 10.1007/S00145-015-9200-X  0.659
2013 Boyle E, Segev G, Wichs D. Fully leakage-resilient signatures Journal of Cryptology. 26: 513-558. DOI: 10.1007/S00145-012-9136-3  0.521
2013 Agrawal S, Dodis Y, Vaikuntanathan V, Wichs D. On continual leakage of discrete log representations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8270: 401-420. DOI: 10.1007/978-3-642-42045-0_21  0.534
2013 Gennaro R, Wichs D. Fully homomorphic message authenticators Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8270: 301-320. DOI: 10.1007/978-3-642-42045-0_16  0.31
2013 Alwen J, Krenn S, Pietrzak K, Wichs D. Learning with rounding, revisited: New reduction, properties and applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8042: 57-74. DOI: 10.1007/978-3-642-40041-4_4  0.644
2012 Asharov G, Jain A, López-Alt A, Tromer E, Vaikuntanathan V, Wichs D. Multiparty computation with low communication, computation and interaction via threshold FHE Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7237: 483-501. DOI: 10.1007/978-3-642-29011-4_29  0.359
2012 Dodis Y, Kiltz E, Pietrzak K, Wichs D. Message authentication, revisited Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7237: 355-374. DOI: 10.1007/978-3-642-29011-4_22  0.613
2012 Dodis Y, Jain A, Moran T, Wichs D. Counterexamples to hardness amplification beyond negligible Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7194: 476-493. DOI: 10.1007/978-3-642-28914-9_27  0.494
2011 Gentry C, Wichs D. Separating succinct non-interactive arguments from all falsifiable assumptions Proceedings of the Annual Acm Symposium On Theory of Computing. 99-108. DOI: 10.1145/1993636.1993651  0.305
2011 Dodis Y, Lewko A, Waters B, Wichs D. Storing secrets on continually leaky devices Proceedings - Annual Ieee Symposium On Foundations of Computer Science, Focs. 688-697. DOI: 10.1109/FOCS.2011.35  0.613
2010 Dodis Y, Haralambiev K, López-Alt A, Wichs D. Cryptography against continuous memory attacks Proceedings - Annual Ieee Symposium On Foundations of Computer Science, Focs. 511-520. DOI: 10.1109/FOCS.2010.56  0.536
2010 Dodis Y, Haralambiev K, López-Alt A, Wichs D. Efficient public-key cryptography in the presence of key leakage Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6477: 613-631. DOI: 10.1007/978-3-642-17373-8_35  0.611
2010 Alwen J, Dodis Y, Wichs D. Survey: Leakage resilience and the bounded retrieval model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5973: 1-18. DOI: 10.1007/978-3-642-14496-7_1  0.734
2010 Alwen J, Dodis Y, Naor M, Segev G, Walfish S, Wichs D. Public-key encryption in the bounded-retrieval model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6110: 113-134. DOI: 10.1007/978-3-642-13190-5_6  0.748
2010 Canetti R, Tauman Kalai Y, Varia M, Wichs D. On symmetric encryption and point obfuscation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5978: 52-71. DOI: 10.1007/978-3-642-11799-2_4  0.394
2009 Dodis Y, Wichs D. Non-malleable extractors and symmetric key cryptography from weak secrets Proceedings of the Annual Acm Symposium On Theory of Computing. 601-610. DOI: 10.1145/1536414.1536496  0.567
2009 Alwen J, Dodis Y, Wichs D. Leakage-resilient public-key cryptography in the bounded-retrieval model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5677: 36-54. DOI: 10.1007/978-3-642-03356-8_3  0.772
2009 Dodis Y, Vadhan S, Wichs D. Proofs of Retrievability via Hardness Amplification Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5444: 109-127. DOI: 10.1007/978-3-642-00457-5_8  0.645
2008 Cramer R, Dodis Y, Fehr S, Padró C, Wichs D. Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4965: 471-488. DOI: 10.1007/978-3-540-78967-3_27  0.627
Show low-probability matches.