Jain, Aayush; Lin, Huijia; Luo, Ji; Wichs, Daniel The pseudorandom oracle model and ideal obfuscation. (English) Zbl 07800211 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14084, 233-262 (2023). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Jain} et al., Lect. Notes Comput. Sci. 14084, 233--262 (2023; Zbl 07800211) Full Text: DOI
Waters, Brent; Wichs, Daniel Universal amplification of KDM security: from 1-key circular to multi-key KDM. (English) Zbl 07799237 Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 14082, 674-693 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Waters} and \textit{D. Wichs}, Lect. Notes Comput. Sci. 14082, 674--693 (2023; Zbl 07799237) Full Text: DOI
Dodis, Yevgeniy; Quach, Willy; Wichs, Daniel Speak much, remember little: cryptography in the bounded storage model, revisited. (English) Zbl 07789157 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14004, 86-116 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Dodis} et al., Lect. Notes Comput. Sci. 14004, 86--116 (2023; Zbl 07789157) Full Text: DOI
Cohen, Ran; Shelat, Abhi; Wichs, Daniel Adaptively secure MPC with sublinear communication complexity. (English) Zbl 1511.94006 J. Cryptology 36, No. 2, Paper No. 11, 82 p. (2023). MSC: 94A05 94A60 PDFBibTeX XMLCite \textit{R. Cohen} et al., J. Cryptology 36, No. 2, Paper No. 11, 82 p. (2023; Zbl 1511.94006) Full Text: DOI
Dodis, Yevgeniy; Karthikeyan, Harish; Wichs, Daniel Updatable public key encryption in the standard model. (English) Zbl 1511.94089 Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13044, 254-285 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Dodis} et al., Lect. Notes Comput. Sci. 13044, 254--285 (2021; Zbl 1511.94089) Full Text: DOI
Quach, Willy; Waters, Brent; Wichs, Daniel Targeted lossy functions and applications. (English) Zbl 1489.94107 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 12828, 424-453 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{W. Quach} et al., Lect. Notes Comput. Sci. 12828, 424--453 (2021; Zbl 1489.94107) Full Text: DOI
Kamath, Chethan; Klein, Karen; Pietrzak, Krzysztof; Wichs, Daniel Limits on the adaptive security of Yao’s garbling. (English) Zbl 1486.94113 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12826, 486-515 (2021). MSC: 94A60 94D10 PDFBibTeX XMLCite \textit{C. Kamath} et al., Lect. Notes Comput. Sci. 12826, 486--515 (2021; Zbl 1486.94113) Full Text: DOI
Wee, Hoeteck; Wichs, Daniel Candidate obfuscation via oblivious LWE sampling. (English) Zbl 1479.94270 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12698, 127-156 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Wee} and \textit{D. Wichs}, Lect. Notes Comput. Sci. 12698, 127--156 (2021; Zbl 1479.94270) Full Text: DOI
Weiss, Mor; Wichs, Daniel Is there an oblivious RAM lower bound for online reads? (English) Zbl 1518.68091 J. Cryptology 34, No. 3, Paper No. 18, 44 p. (2021). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{M. Weiss} and \textit{D. Wichs}, J. Cryptology 34, No. 3, Paper No. 18, 44 p. (2021; Zbl 1518.68091) Full Text: DOI
Li, Xin; Ma, Fermi; Quach, Willy; Wichs, Daniel Leakage-resilient key exchange and two-seed extractors. (English) Zbl 1503.94040 Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12170, 401-429 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{X. Li} et al., Lect. Notes Comput. Sci. 12170, 401--429 (2020; Zbl 1503.94040) Full Text: DOI
Döttling, Nico; Garg, Sanjam; Hajiabadi, Mohammad; Masny, Daniel; Wichs, Daniel Two-round oblivious transfer from CDH or LPN. (English) Zbl 1492.94091 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 768-797 (2020). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Döttling} et al., Lect. Notes Comput. Sci. 12106, 768--797 (2020; Zbl 1492.94091) Full Text: DOI
Lombardi, Alex; Vaikuntanathan, Vinod; Wichs, Daniel Statistical ZAPR arguments from bilinear maps. (English) Zbl 1479.94229 Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12107, 620-641 (2020). MSC: 94A60 68P25 68M12 PDFBibTeX XMLCite \textit{A. Lombardi} et al., Lect. Notes Comput. Sci. 12107, 620--641 (2020; Zbl 1479.94229) Full Text: DOI Link
Weiss, Mor; Wichs, Daniel Is there an oblivious RAM lower bound for online reads? (English) Zbl 1430.94090 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11240, 603-635 (2018). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. Weiss} and \textit{D. Wichs}, Lect. Notes Comput. Sci. 11240, 603--635 (2018; Zbl 1430.94090) Full Text: DOI
Garg, Sanjam; Gentry, Craig; Halevi, Shai; Wichs, Daniel On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input. (English) Zbl 1405.94064 Algorithmica 79, No. 4, 1353-1373 (2017). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{S. Garg} et al., Algorithmica 79, No. 4, 1353--1373 (2017; Zbl 1405.94064) Full Text: DOI
Hofheinz, Dennis; Rao, Vanishree; Wichs, Daniel Standard security does not imply indistinguishability under selective opening. (English) Zbl 1397.94072 Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016, Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53643-8/pbk; 978-3-662-53644-5/ebook). Lecture Notes in Computer Science 9986, 121-145 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Hofheinz} et al., Lect. Notes Comput. Sci. 9986, 121--145 (2016; Zbl 1397.94072) Full Text: DOI
Jafargholi, Zahra; Wichs, Daniel Adaptive security of Yao’s garbled circuits. (English) Zbl 1406.94068 Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 433-458 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{Z. Jafargholi} and \textit{D. Wichs}, Lect. Notes Comput. Sci. 9985, 433--458 (2016; Zbl 1406.94068) Full Text: DOI
Hemenway, Brett; Jafargholi, Zahra; Ostrovsky, Rafail; Scafuro, Alessandra; Wichs, Daniel Adaptively secure garbled circuits from one-way functions. (English) Zbl 1406.94063 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part III. Berlin: Springer (ISBN 978-3-662-53014-6/pbk; 978-3-662-53015-3/ebook). Lecture Notes in Computer Science 9816, 149-178 (2016). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{B. Hemenway} et al., Lect. Notes Comput. Sci. 9816, 149--178 (2016; Zbl 1406.94063) Full Text: DOI
Dodis, Yevgeniy; Halevi, Shai; Rothblum, Ron D.; Wichs, Daniel Spooky encryption and its applications. (English) Zbl 1406.94045 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part III. Berlin: Springer (ISBN 978-3-662-53014-6/pbk; 978-3-662-53015-3/ebook). Lecture Notes in Computer Science 9816, 93-122 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Dodis} et al., Lect. Notes Comput. Sci. 9816, 93--122 (2016; Zbl 1406.94045) Full Text: DOI
Hazay, Carmit; López-Alt, Adriana; Wee, Hoeteck; Wichs, Daniel Leakage-resilient cryptography from minimal assumptions. (English) Zbl 1348.94054 J. Cryptology 29, No. 3, 514-551 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Hazay} et al., J. Cryptology 29, No. 3, 514--551 (2016; Zbl 1348.94054) Full Text: DOI
Devadas, Srinivas; van Dijk, Marten; Fletcher, Christopher W.; Ren, Ling; Shi, Elaine; Wichs, Daniel Onion ORAM: a constant bandwidth blowup oblivious RAM. (English) Zbl 1377.94047 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 145-174 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Devadas} et al., Lect. Notes Comput. Sci. 9563, 145--174 (2016; Zbl 1377.94047) Full Text: DOI
Boyle, Elette; Segev, Gil; Wichs, Daniel Fully leakage-resilient signatures. (English) Zbl 1335.94089 J. Cryptology 26, No. 3, 513-558 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Boyle} et al., J. Cryptology 26, No. 3, 513--558 (2013; Zbl 1335.94089) Full Text: DOI