Volgen
Mark Zhandry
Mark Zhandry
NTT Research
Geverifieerd e-mailadres voor princeton.edu - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Random oracles in a quantum world
D Boneh, Ö Dagdelen, M Fischlin, A Lehmann, C Schaffner, M Zhandry
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
5072011
Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation
D Boneh, M Zhandry
Algorithmica 79, 1233-1285, 2017
3072017
How to construct quantum random functions
M Zhandry
Journal of the ACM (JACM) 68 (5), 1-43, 2021
286*2021
Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation
D Boneh, K Lewi, M Raykova, A Sahai, M Zhandry, J Zimmerman
Annual International Conference on the Theory and Applications of …, 2015
2832015
Secure identity-based encryption in the quantum random oracle model
M Zhandry
International Journal of Quantum Information 13 (04), 1550014, 2015
2302015
Secure signatures and chosen ciphertext security in a quantum computing world
D Boneh, M Zhandry
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
2102013
How to record quantum queries, and applications to quantum indifferentiability
M Zhandry
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
2062019
Functional encryption without obfuscation
S Garg, C Gentry, S Halevi, M Zhandry
Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2016
189*2016
Annihilation attacks for multilinear maps: Cryptanalysis of indistinguishability obfuscation over GGH13
E Miles, A Sahai, M Zhandry
Annual International Cryptology Conference, 629-658, 2016
1822016
Differing-inputs obfuscation and applications
P Ananth, D Boneh, S Garg, A Sahai, M Zhandry
Cryptology ePrint Archive, 2013
1622013
Quantum-secure message authentication codes
D Boneh, M Zhandry
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
1612013
A note on the quantum collision and set equality problems
M Zhandry
arXiv preprint arXiv:1312.1027, 2013
1452013
Revisiting post-quantum fiat-shamir
Q Liu, M Zhandry
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
1382019
Low overhead broadcast encryption from multilinear maps
D Boneh, B Waters, M Zhandry
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
1342014
Post-zeroizing obfuscation: New mathematical tools, and the case of evasive circuits
S Badrinarayanan, E Miles, A Sahai, M Zhandry
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
110*2016
Quantum lightning never strikes the same state twice. or: quantum money from cryptographic assumptions
M Zhandry
Journal of Cryptology 34, 1-56, 2021
1082021
Secure obfuscation in a weak multilinear map model
S Garg, E Miles, P Mukherjee, A Sahai, A Srinivasan, M Zhandry
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016
108*2016
Fully secure attribute based encryption from multilinear maps
S Garg, C Gentry, S Halevi, M Zhandry
Cryptology ePrint Archive, 2014
652014
Breaking the sub-exponential barrier in obfustopia
S Garg, O Pandey, A Srinivasan, M Zhandry
Annual International Conference on the Theory and Applications of …, 2017
642017
The magic of ELFs
M Zhandry
Journal of Cryptology 32, 825-866, 2019
632019
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20