Efficient Fully Homomorphic Encryption from (Standard) Z Brakerski, V Vaikuntanathan
SIAM Journal on computing 43 (2), 831-871, 2014
2115 2014 (Leveled) fully homomorphic encryption without bootstrapping Z Brakerski, C Gentry, V Vaikuntanathan
ACM Transactions on Computation Theory (TOCT) 6 (3), 1-36, 2014
1548 2014 Fully homomorphic encryption from ring-LWE and security for key dependent messages Z Brakerski, V Vaikuntanathan
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
1338 2011 Fully homomorphic encryption without modulus switching from classical GapSVP Z Brakerski
Advances in Cryptology–CRYPTO 2012: 32nd Annual Cryptology Conference, Santa …, 2012
1119 2012 Classical hardness of learning with errors Z Brakerski, A Langlois, C Peikert, O Regev, D Stehlé
Proceedings of the forty-fifth annual ACM symposium on Theory of computing …, 2013
727 2013 Lattice-based FHE as secure as PKE Z Brakerski, V Vaikuntanathan
Proceedings of the 5th conference on Innovations in theoretical computer …, 2014
364 2014 Overcoming the hole in the bucket: Public-key cryptography resilient to continual memory leakage Z Brakerski, YT Kalai, J Katz, V Vaikuntanathan
2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 501-510, 2010
287 2010 Virtual black-box obfuscation for all circuits via generic graded encoding Z Brakerski, GN Rothblum
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014 …, 2014
272 2014 Packed ciphertexts in LWE-based homomorphic encryption Z Brakerski, C Gentry, S Halevi
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013
261 2013 Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability: (or: Quadratic Residuosity Strikes Back) Z Brakerski, S Goldwasser
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
205 2010 Lattice-based fully dynamic multi-key FHE with short ciphertexts Z Brakerski, R Perlman
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
170 2016 Hedged public-key encryption: How to protect against bad randomness M Bellare, Z Brakerski, M Naor, T Ristenpart, G Segev, H Shacham, ...
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
168 2009 From selective to adaptive security in functional encryption P Ananth, Z Brakerski, G Segev, V Vaikuntanathan
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
151 2015 A cryptographic test of quantumness and certifiable randomness from a single quantum device Z Brakerski, P Christiano, U Mahadev, U Vazirani, T Vidick
Journal of the ACM (JACM) 68 (5), 1-47, 2021
119 2021 Function-private functional encryption in the private-key setting Z Brakerski, G Segev
Journal of Cryptology 31, 202-225, 2018
118 2018 Obfuscating circuits via composite-order graded encoding B Applebaum, Z Brakerski
Cryptology ePrint Archive, 2015
107 2015 Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions: Or: How to Secretly Embed a Circuit in Your PRF Z Brakerski, V Vaikuntanathan
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
106 2015 Better security for deterministic public-key encryption: The auxiliary-input setting Z Brakerski, G Segev
Journal of cryptology 27, 210-247, 2014
106 2014 Circuit-ABE from LWE: unbounded attributes and semi-adaptive security Z Brakerski, V Vaikuntanathan
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
102 2016 Anonymous IBE, leakage resilience and circular security from new assumptions Z Brakerski, A Lombardi, G Segev, V Vaikuntanathan
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
99 2018