Showing results 1 to 20 of 31
next >
Publication Date | Article Title | Author(s) |
2020 | Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption | Bartusek, James; Ishai, Yuval; Jain, Aayush; Ma, Fermi; Sahai, Amit; et al |
2016 | Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 | Miles, Eric; Sahai, Amit; Zhandry, Mark |
2016 | Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key | Nishimaki, Ryo; Wichs, Daniel; Zhandry, Mark |
2017 | Breaking the Sub-Exponential Barrier in Obfustopia | Garg, Sanjam; Pandey, Omkant; Srinivasan, Akshayaram; Zhandry, Mark |
2021 | Classical vs Quantum Random Oracles | Yamakawa, Takashi; Zhandry, Mark |
Dec-2018 | Cutting-edge cryptography through the lens of secret sharing | Komargodski, Ilan; Zhandry, Mark |
2021 | Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness | Liu, Qipeng; Zhandry, Mark |
2019 | The Distinction Between Fixed and Random Generators in Group-Based Assumptions | Bartusek, James; Ma, Fermi; Zhandry, Mark |
2016 | How to Generate and Use Universal Samplers | Hofheinz, Dennis; Jager, Tibor; Khurana, Dakshita; Sahai, Amit; Waters, Brent; et al |
2019 | How to Record Quantum Queries, and Applications to Quantum Indifferentiability | Zhandry, Mark |
2020 | Indifferentiability for Public Key Cryptosystems | Zhandry, Mark; Zhang, Cong |
2016 | The Magic of ELFs | Zhandry, Mark |
2019 | The Magic of ELFs | Zhandry, Mark |
2014 | Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation | Boneh, Dan; Zhandry, Mark |
2017 | Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation | Boneh, Dan; Zhandry, Mark |
2020 | Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves | Boneh, Dan; Glass, Darren; Krashen, Daniel; Lauter, Kristin; Sharif, Shahed; et al |
2017 | New Security Notions and Feasibility Results for Authentication of Quantum Data | Garg, Sumegha; Yuen, Henry; Zhandry, Mark |
2019 | New Techniques for Obfuscating Conjunctions | Bartusek, James; Lepoint, Tancrède; Ma, Fermi; Zhandry, Mark |
2020 | New Techniques for Traitor Tracing: Size 𝑁1/3 and More from Pairings | Zhandry, Mark |
2019 | On ELFs, Deterministic Encryption, and Correlated-Input Security | Zhandry, Mark |