Craig Gentry, Ph.D. - Publications

Affiliations: 
2009 Stanford University, Palo Alto, CA 

10 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2017 Garg S, Gentry C, Halevi S, Wichs D. On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input Algorithmica. 79: 1353-1373. DOI: 10.1007/S00453-017-0276-6  0.316
2016 Parno B, Howell J, Gentry C, Raykova M. Pinocchio: Nearly practical verifiable computation Communications of the Acm. 59: 103-112. DOI: 10.1145/2856449  0.361
2016 Garg S, Gentry C, Halevi S, Raykova M, Sahai A, Waters B. Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits Siam Journal On Computing. 45: 882-929. DOI: 10.1137/14095772X  0.333
2014 Gentry C, Groth J, Ishai Y, Peikert C, Sahai A, Smith A. Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs Journal of Cryptology. 28: 820-843. DOI: 10.1007/S00145-014-9184-Y  0.315
2013 Gentry C, Halevi S, Peikert C, Smart NP. Field switching in BGV-style homomorphic encryption Journal of Computer Security. 21: 663-684. DOI: 10.3233/Jcs-130480  0.345
2010 Gentry C. Computing arbitrary functions of encrypted data Communications of the Acm. 53: 97-105. DOI: 10.1145/1666420.1666444  0.375
2008 Boldyreva A, Gentry C, O'Neill A, Yum DH. New multiparty signature schemes for network routing applications Acm Transactions On Information and System Security. 12. DOI: 10.1145/1410234.1410237  0.442
2007 Fujimoto H, Suzuki T, Nakayama T, Takeshita A, Ramzan Z, Gentry C, Jain R. Content protection in adaptive content delivery Electronics and Communications in Japan Part I-Communications. 90: 54-66. DOI: 10.1002/Ecja.20341  0.353
2005 Gentry C, Hevia A, Jain R, Kawahara T, Ramzan Z. End-to-end security in the presence of intelligent data adapting proxies: The case of authenticating transcoded streaming media Ieee Journal On Selected Areas in Communications. 23: 464-473. DOI: 10.1109/Jsac.2004.839391  0.424
2004 Gentry C, Ramzan Z. Provable Cryptographic Security and its Applications to Mobile Wireless Computing Wireless Personal Communications. 29: 191-203. DOI: 10.1023/B:Wire.0000047062.69722.82  0.394
Show low-probability matches.