Æȷοì
Daniel Wichs
Daniel Wichs
Northeastern University, Associate Professor
ccs.neu.eduÀÇ À̸ÞÀÏ È®ÀÎµÊ - ȨÆäÀÌÁö
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Proofs of retrievability via hardness amplification
Y Dodis, S Vadhan, D Wichs
Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San ¡¦, 2009
5472009
Separating succinct non-interactive arguments from all falsifiable assumptions
C Gentry, D Wichs
Proceedings of the forty-third annual ACM symposium on Theory of computing ¡¦, 2011
5402011
Multiparty computation with low communication, computation and interaction via threshold FHE
G Asharov, A Jain, A López-Alt, E Tromer, V Vaikuntanathan, D Wichs
Advances in Cryptology–EUROCRYPT 2012: 31st Annual International Conference ¡¦, 2012
5152012
Two round multiparty computation via multi-key FHE
P Mukherjee, D Wichs
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference ¡¦, 2016
3942016
Leakage-resilient public-key cryptography in the bounded-retrieval model
J Alwen, Y Dodis, D Wichs
Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology ¡¦, 2009
3722009
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
R Cramer, Y Dodis, S Fehr, C Padró, D Wichs
Annual International Conference on the Theory and Applications of ¡¦, 2008
3422008
Dynamic proofs of retrievability via oblivious RAM
D Cash, A Küpçü, D Wichs
Journal of Cryptology 30, 22-57, 2017
3132017
Cryptography against continuous memory attacks
Y Dodis, K Haralambiev, A López-Alt, D Wichs
2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 511-520, 2010
2922010
Non-malleable codes
S Dziembowski, K Pietrzak, D Wichs
Journal of the ACM (JACM) 65 (4), 1-32, 2018
2842018
Leveled fully homomorphic signatures from standard lattices
S Gorbunov, V Vaikuntanathan, D Wichs
Proceedings of the forty-seventh annual ACM symposium on Theory of computing ¡¦, 2015
2642015
Public-key encryption in the bounded-retrieval model
J Alwen, Y Dodis, M Naor, G Segev, S Walfish, D Wichs
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference ¡¦, 2010
2562010
Optimizing ORAM and using it efficiently for secure computation
C Gentry, KA Goldman, S Halevi, C Julta, M Raykova, D Wichs
Privacy Enhancing Technologies: 13th International Symposium, PETS 2013 ¡¦, 2013
2492013
Learning with rounding, revisited: New reduction, properties and applications
J Alwen, S Krenn, K Pietrzak, D Wichs
Annual Cryptology Conference, 57-74, 2013
2302013
Efficient public-key cryptography in the presence of key leakage
Y Dodis, K Haralambiev, A López-Alt, D Wichs
Advances in Cryptology-ASIACRYPT 2010: 16th International Conference on the ¡¦, 2010
2142010
Fully homomorphic message authenticators
R Gennaro, D Wichs
International Conference on the Theory and Application of Cryptology and ¡¦, 2013
2042013
Fiat-Shamir: from practice to theory
R Canetti, Y Chen, J Holmgren, A Lombardi, GN Rothblum, RD Rothblum, ...
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing ¡¦, 2019
197*2019
Onion ORAM: A constant bandwidth blowup oblivious RAM
S Devadas, M van Dijk, CW Fletcher, L Ren, E Shi, D Wichs
Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv ¡¦, 2016
1932016
Non-malleable extractors and symmetric key cryptography from weak secrets
Y Dodis, D Wichs
Proceedings of the forty-first annual ACM Symposium on Theory of Computing ¡¦, 2009
1772009
Obfuscating compute-and-compare programs under LWE
D Wichs, G Zirdelis
2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS ¡¦, 2017
1642017
Security analysis of pseudo-random number generators with input: /dev/random is not robust
Y Dodis, D Pointcheval, S Ruhault, D Vergniaud, D Wichs
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications ¡¦, 2013
1562013
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20