Volgen
Mark Zhandry
Mark Zhandry
NTT Research
Geverifieerd e-mailadres voor princeton.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Random oracles in a quantum world
D Boneh, Ö Dagdelen, M Fischlin, A Lehmann, C Schaffner, M Zhandry
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
5822011
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
D Boneh, M Zhandry
Algorithmica 79, 1233-1285, 2017
3372017
How to construct quantum random functions
M Zhandry
Journal of the ACM (JACM) 68 (5), 1-43, 2021
3272021
Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation
D Boneh, K Lewi, M Raykova, A Sahai, M Zhandry, J Zimmerman
Annual International Conference on the Theory and Applications of …, 2015
3032015
Secure identity-based encryption in the quantum random oracle model
M Zhandry
International Journal of Quantum Information 13 (04), 1550014, 2015
2642015
How to record quantum queries, and applications to quantum indifferentiability
M Zhandry
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
2472019
Secure signatures and chosen ciphertext security in a quantum computing world
D Boneh, M Zhandry
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
2302013
Functional encryption without obfuscation
S Garg, C Gentry, S Halevi, M Zhandry
Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2016
199*2016
Annihilation attacks for multilinear maps: Cryptanalysis of indistinguishability obfuscation over GGH13
E Miles, A Sahai, M Zhandry
Annual International Cryptology Conference, 629-658, 2016
1882016
Quantum-secure message authentication codes
D Boneh, M Zhandry
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
1772013
Differing-inputs obfuscation and applications
P Ananth, D Boneh, S Garg, A Sahai, M Zhandry
Cryptology ePrint Archive, 2013
1682013
A note on the quantum collision and set equality problems
M Zhandry
arXiv preprint arXiv:1312.1027, 2013
1592013
Revisiting post-quantum fiat-shamir
Q Liu, M Zhandry
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
1572019
Quantum lightning never strikes the same state twice. or: quantum money from cryptographic assumptions
M Zhandry
Journal of Cryptology 34, 1-56, 2021
1372021
Low overhead broadcast encryption from multilinear maps
D Boneh, B Waters, M Zhandry
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
1372014
Post-zeroizing obfuscation: new mathematical tools, and the case of evasive circuits
S Badrinarayanan, E Miles, A Sahai, M Zhandry
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
114*2016
Secure obfuscation in a weak multilinear map model
S Garg, E Miles, P Mukherjee, A Sahai, A Srinivasan, M Zhandry
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016
108*2016
Hidden cosets and applications to unclonable cryptography
A Coladangelo, J Liu, Q Liu, M Zhandry
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
862021
One-shot signatures and applications to hybrid quantum/classical authentication
R Amos, M Georgiou, A Kiayias, M Zhandry
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing …, 2020
722020
The magic of ELFs
M Zhandry
Journal of Cryptology 32, 825-866, 2019
692019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20