Name
Affiliation
Papers
DANIEL WICHS
Northeastern Univ, Boston, MA 02115 USA
93
Collaborators
Citations 
PageRank 
125
1918
73.41
Referers 
Referees 
References 
2027
887
1790
Search Limit
1001000
Title
Citations
PageRank
Year
Authentication in the Bounded Storage Model.00.342022
The Pseudorandom Oracle Model and Ideal Obfuscation.00.342022
Witness Encryption and Null-IO from Evasive LWE.00.342022
Nearly Optimal Property Preserving Hashing.00.342022
Updatable Public Key Encryption in the Standard Model.00.342022
Post-Quantum Insecurity from LWE.00.342022
Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC.00.342022
Boosting Batch Arguments and RAM Delegation.00.342022
Is There An Oblivious Ram Lower Bound For Online Reads?00.342021
Targeted Lossy Functions And Applications00.342021
Succinct LWE Sampling, Random Polynomials, and Obfuscation00.342021
Limits On The Adaptive Security Of Yao'S Garbling00.342021
Updatable Public Key Encryption in the Standard Model00.342021
Witness Maps and Applications.00.342020
Statistical ZAPR Arguments from Bilinear Maps.00.342020
Broadcast and Trace with (N^{varepsilon }) Ciphertext Size from Standard Assumptions00.342019
Adaptively Secure MPC with Sublinear Communication Complexity00.342019
New Constructions of Reusable Designated-Verifier NIZKs.00.342019
2-Message Publicly Verifiable WI from (Subexponential) LWE.00.342019
Fiat-Shamir: from practice to theory00.342019
Reusable Designated-Verifier NIZKs for all NP from CDH.00.342019
Non-malleable Codes for Decision Trees.00.342019
On the Plausibility of Fully Homomorphic Encryption for RAMs.00.342019
Non-Interactive Zero Knowledge and Correlation Intractability from Circular-Secure FHE.00.342018
Watermarking Prfs Under Standard Assumptions: Public Marking And Security With Extraction Queries00.342018
Hardness of Non-Interactive Differential Privacy from One-Way Functions.00.342018
Non-Trivial Witness Encryption and Null-iO from Standard Assumptions.10.352018
Private Anonymous Data Access.10.352018
Is There An Oblivious Ram Lower Bound For Online Reads?00.342018
Laconic Function Evaluation and Applications30.382018
Succinct delegation for low-space non-deterministic computation.00.342018
Traitor-Tracing From Lwe Made Simple And Attribute-Based00.342018
Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing.00.342018
Obfuscating Compute-and-Compare Programs under LWE130.522017
Non-Interactive Delegation for Low-Space Non-Deterministic Computation.00.342017
Adaptively Indistinguishable Garbled Circuits.20.352017
The Edited Truth.00.342017
Be Adaptive, Avoid Overcommitting.10.352017
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM.280.772016
Obfuscating Conjunctions Under Entropic Ring Lwe120.632016
Spooky Encryption and its Applications.150.572016
Watermarking Cryptographic Capabilities.40.402016
Adaptively Secure Garbled Circuits from One-Way Functions.170.572016
Two Round Multiparty Computation via Multi-key FHE.521.292016
Standard Security Does Not Imply Indistinguishability Under Selective Opening.90.522016
Adaptive Security of Yao's Garbled Circuits.90.442016
Perfect Structure on the Edge of Chaos - Trapdoor Permutations from Indistinguishability Obfuscation.80.442016
Essentially Optimal Robust Secret Sharing with Maximal Corruptions.60.472015
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key.40.402015
Perfect Structure on the Edge of Chaos.180.542015
  • 1
  • 2