Search

Your search keyword '"Gentry, Craig"' showing total 243 results

Search Constraints

Start Over You searched for: Author "Gentry, Craig" Remove constraint Author: "Gentry, Craig"
243 results on '"Gentry, Craig"'

Search Results

1. Achievable CCA2 Relaxation for Homomorphic Encryption

3. Random-Index PIR and Applications

4. YOSO: You Only Speak Once : Secure MPC with Stateless Ephemeral Roles

5. Can a Public Blockchain Keep a Secret?

8. Compressible FHE with Applications to PIR

9. Homomorphic Encryption for Finite Automata

10. A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures

12. YOSO: You Only Speak Once

13. Can a Public Blockchain Keep a Secret?

14. Cryptanalyses of Candidate Branching Program Obfuscators

15. Functional Encryption Without Obfuscation

17. Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations

18. Graph-Induced Multilinear Maps from Lattices

19. Private Database Access with HE-over-ORAM Architecture

20. On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input

21. Witness Encryption from Instance Independent Assumptions

22. Garbled RAM Revisited

23. Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits

24. Two-Round Secure MPC from Indistinguishability Obfuscation

27. Discrete Gaussian Leftover Hash Lemma over Infinite Domains

28. Attribute-Based Encryption for Circuits from Multilinear Maps

29. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based

30. Optimizing ORAM and Using It Efficiently for Secure Computation

31. Private Database Queries Using Somewhat Homomorphic Encryption

32. Quadratic Span Programs and Succinct NIZKs without PCPs

33. Candidate Multilinear Maps from Ideal Lattices

34. Packed Ciphertexts in LWE-Based Homomorphic Encryption

35. Ring Switching in BGV-Style Homomorphic Encryption

36. Homomorphic Evaluation of the AES Circuit

37. Better Bootstrapping in Fully Homomorphic Encryption

38. Fully Homomorphic Encryption with Polylog Overhead

39. Implementing Gentry’s Fully-Homomorphic Encryption Scheme

41. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers

42. i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits

43. Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness

44. A Simple BGN-Type Cryptosystem from LWE

45. Fully Homomorphic Encryption over the Integers

46. Secure Distributed Human Computation : (Extended Abstract)

47. Secure Distributed Human Computation : (Transcript of Discussion)

48. Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)

49. Hierarchical Identity Based Encryption with Polynomially Many Levels

50. IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures

Catalog

Books, media, physical & digital resources