Name
Affiliation
Papers
MARK ZHANDRY
stanford university
68
Collaborators
Citations 
PageRank 
68
552
34.46
Referers 
Referees 
References 
738
444
666
Search Limit
100738
Title
Citations
PageRank
Year
Commitments to Quantum States.00.342022
Verifiable Quantum Advantage without Structure.00.342022
Adaptive Multiparty NIKE.00.342022
Augmented Random Oracles.00.342022
On the Feasibility of Unclonable Encryption, and More.00.342022
Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering00.342022
New Approaches For Quantum Copy-Protection00.342021
Franchised Quantum Money.00.342021
How to Construct Quantum Random Functions10.352021
Post-Quantum Succinct Arguments: Breaking the Quantum Rewinding Barrier00.342021
White Box Traitor Tracing00.342021
Disappearing Cryptography in the Bounded Storage Model00.342021
Hidden Cosets And Applications To Unclonable Cryptography00.342021
Quantum Lightning Never Strikes The Same State Twice. Or: Quantum Money From Cryptographic Assumptions00.342021
Iterated Inhomogeneous Polynomials.00.342021
Franchised Quantum Money.00.342021
One-shot signatures and applications to hybrid quantum/classical authentication00.342020
Multiparty Non-Interactive Key Exchange And More From Isogenies On Elliptic Curves00.342020
Simple Schemes in the Bounded Storage Model.00.342019
On ELFs, Deterministic Encryption, and Correlated-Input Security.00.342019
The Distinction Between Fixed and Random Generators in Group-Based Assumptions00.342019
Revisiting Post-quantum Fiat-Shamir20.392019
Parameter-Hiding Order Revealing Encryption.00.342018
On Finding Quantum Multi-collisions.00.342018
Cutting-Edge Cryptography Through the Lens of Secret Sharing.40.392018
New Techniques for Obfuscating Conjunctions.00.342018
Impossibility Of Order-Revealing Encryption In Idealized Models00.342018
How to Record Quantum Queries, and Applications to Quantum Indifferentiability.10.352018
The Mmap Strikes Back: Obfuscation And New Multilinear Maps Immune To Clt13 Zeroizing Attacks20.372018
Return Of Ggh15: Provable Security Against Zeroizing Attacks00.342018
Preventing Zeroizing Attacks on GGH15.10.352018
Quantum Lightning Never Strikes the Same State Twice.10.362017
New Multilinear Maps from CLT13 with Provable Security Against Zeroizing Attacks.10.352017
New security notions and feasibility results for authentication of quantum data.90.662017
Decomposable Obfuscation: A Framework For Building Applications Of Obfuscation From Polynomial Hardness30.372017
Exploding Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness.00.342017
Breaking the Sub-Exponential Barrier in Obfustopia.180.542017
Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption.00.342017
Secure obfuscation in a weak multilinear map model: A simple construction secure against all known attacks.90.532016
Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits.200.662016
How to Avoid Obfuscation Using Witness PRFs.00.342016
Strong Hardness of Privacy from Weak Traitor Tracing.30.382016
How to Generate and Use Universal Samplers.120.482016
A Note on Quantum-Secure PRPs.00.342016
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13.440.892016
Functional Encryption Without Obfuscation.330.802016
The Magic of ELFs.90.442016
Secure Obfuscation in a Weak Multilinear Map Model.280.682016
Order-Revealing Encryption and the Hardness of Private Learning.10.342016
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key.40.402015
  • 1
  • 2