Volgen
Vinod Vaikuntanathan
Vinod Vaikuntanathan
Professor of Computer Science, Massachusetts Institute of Technology
Geverifieerd e-mailadres voor csail.mit.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Trapdoors for hard lattices and new cryptographic constructions
C Gentry, C Peikert, V Vaikuntanathan
Proceedings of the fortieth annual ACM symposium on Theory of computing, 197-206, 2008
25612008
Fully homomorphic encryption over the integers
M Van Dijk, C Gentry, S Halevi, V Vaikuntanathan
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
23972010
Efficient Fully Homomorphic Encryption from (Standard)
Z Brakerski, V Vaikuntanathan
SIAM Journal on computing 43 (2), 831-871, 2014
21152014
(Leveled) fully homomorphic encryption without bootstrapping
Z Brakerski, C Gentry, V Vaikuntanathan
ACM Transactions on Computation Theory (TOCT) 6 (3), 1-36, 2014
15562014
Can homomorphic encryption be practical?
M Naehrig, K Lauter, V Vaikuntanathan
Proceedings of the 3rd ACM workshop on Cloud computing security workshop …, 2011
13552011
Fully homomorphic encryption from ring-LWE and security for key dependent messages
Z Brakerski, V Vaikuntanathan
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
13382011
On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption
A López-Alt, E Tromer, V Vaikuntanathan
Proceedings of the forty-fourth annual ACM symposium on Theory of computing …, 2012
10052012
A framework for efficient and composable oblivious transfer
C Peikert, V Vaikuntanathan, B Waters
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
8102008
{GAZELLE}: A low latency framework for secure neural network inference
C Juvekar, V Vaikuntanathan, A Chandrakasan
27th {USENIX} Security Symposium ({USENIX} Security 18), 1651-1669, 2018
7012018
Simultaneous hardcore bits and cryptography against memory attacks
A Akavia, S Goldwasser, V Vaikuntanathan
Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San …, 2009
5772009
Reusable garbled circuits and succinct functional encryption
S Goldwasser, Y Kalai, RA Popa, V Vaikuntanathan, N Zeldovich
Proceedings of the forty-fifth annual ACM symposium on Theory of computing …, 2013
5162013
Attribute-based encryption for circuits
S Gorbunov, V Vaikuntanathan, H Wee
Journal of the ACM (JACM) 62 (6), 1-33, 2015
4902015
Multiparty computation with low communication, computation and interaction via threshold FHE
G Asharov, A Jain, A López-Alt, E Tromer, V Vaikuntanathan, D Wichs
Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference …, 2012
4482012
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits
D Boneh, C Gentry, S Gorbunov, S Halevi, V Nikolaenko, G Segev, ...
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
4422014
How to delegate and verify in public: Verifiable computation from attribute-based encryption
B Parno, M Raykova, V Vaikuntanathan
Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012 …, 2012
4342012
Lattice-based FHE as secure as PKE
Z Brakerski, V Vaikuntanathan
Proceedings of the 5th conference on Innovations in theoretical computer …, 2014
3642014
Functional encryption with bounded collusions via multi-party computation
S Gorbunov, V Vaikuntanathan, H Wee
Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012
3002012
Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage
Z Brakerski, YT Kalai, J Katz, V Vaikuntanathan
2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 501-510, 2010
2872010
Signature schemes with bounded leakage resilience
J Katz, V Vaikuntanathan
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
2852009
A group signature scheme from lattice assumptions
SD Gordon, J Katz, V Vaikuntanathan
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the …, 2010
2742010
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20