Mark Zhandry
Mark Zhandry
Geverifieerd e-mailadres voor princeton.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Random oracles in a quantum world
D Boneh, ึ Dagdelen, M Fischlin, A Lehmann, C Schaffner, M Zhandry
International conference on the theory and application of cryptology and …, 2011
2802011
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
D Boneh, M Zhandry
Algorithmica 79 (4), 1233-1285, 2017
2242017
Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation
D Boneh, K Lewi, M Raykova, A Sahai, M Zhandry, J Zimmerman
Annual International Conference on the Theory and Applications of …, 2015
2172015
How to construct quantum random functions
M Zhandry
2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, 679-687, 2012
1772012
Functional encryption without obfuscation
S Garg, C Gentry, S Halevi, M Zhandry
Theory of Cryptography Conference, 480-511, 2016
158*2016
Annihilation attacks for multilinear maps: Cryptanalysis of indistinguishability obfuscation over GGH13
E Miles, A Sahai, M Zhandry
Annual International Cryptology Conference, 629-658, 2016
1492016
Secure identity-based encryption in the quantum random oracle model
M Zhandry
International Journal of Quantum Information 13 (04), 1550014, 2015
1472015
Secure signatures and chosen ciphertext security in a quantum computing world
D Boneh, M Zhandry
Annual cryptology conference, 361-379, 2013
1362013
Differing-Inputs Obfuscation and Applications.
P Ananth, D Boneh, S Garg, A Sahai, M Zhandry
IACR Cryptol. ePrint Arch. 2013, 689, 2013
1332013
Low overhead broadcast encryption from multilinear maps
D Boneh, B Waters, M Zhandry
Annual Cryptology Conference, 206-223, 2014
1052014
Secure obfuscation in a weak multilinear map model
S Garg, E Miles, P Mukherjee, A Sahai, A Srinivasan, M Zhandry
Theory of Cryptography Conference, 241-268, 2016
96*2016
Quantum-secure message authentication codes
D Boneh, M Zhandry
Annual International Conference on the Theory and Applications of …, 2013
912013
Post-zeroizing obfuscation: New mathematical tools, and the case of evasive circuits
S Badrinarayanan, E Miles, A Sahai, M Zhandry
Annual International Conference on the Theory and Applications of …, 2016
87*2016
A note on the quantum collision and set equality problems
M Zhandry
arXiv preprint arXiv:1312.1027, 2013
802013
How to record quantum queries, and applications to quantum indifferentiability
M Zhandry
Annual International Cryptology Conference, 239-268, 2019
722019
Revisiting post-quantum fiat-shamir
Q Liu, M Zhandry
Annual International Cryptology Conference, 326-355, 2019
602019
Fully Secure Attribute Based Encryption from Multilinear Maps.
S Garg, C Gentry, S Halevi, M Zhandry
IACR Cryptol. ePrint Arch. 2014, 622, 2014
582014
Breaking the sub-exponential barrier in obfustopia
S Garg, O Pandey, A Srinivasan, M Zhandry
Annual International Conference on the Theory and Applications of …, 2017
452017
How to avoid obfuscation using witness PRFs
M Zhandry
Theory of Cryptography Conference, 421-448, 2016
452016
How to generate and use universal samplers
D Hofheinz, T Jager, D Khurana, A Sahai, B Waters, M Zhandry
International Conference on the Theory and Application of Cryptology and …, 2016
432016
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20