Search

Your search keyword '"VAIKUNTANATHAN, VINOD"' showing total 533 results

Search Constraints

Start Over You searched for: Author "VAIKUNTANATHAN, VINOD" Remove constraint Author: "VAIKUNTANATHAN, VINOD"
533 results on '"VAIKUNTANATHAN, VINOD"'

Search Results

1. How to Construct Quantum FHE, Generically

2. A system capable of verifiably and privately screening global DNA synthesis

3. Sparse Linear Regression and Lattice Problems

4. Space-Efficient and Noise-Robust Quantum Factoring

5. Collaborative privacy-preserving analysis of oncological data using multiparty homomorphic encryption.

6. PEOPL: Characterizing Privately Encoded Open Datasets with Public Labels

7. Revocable Cryptography from Learning with Errors

8. Lattice Problems Beyond Polynomial Time

9. Space-Efficient and Noise-Robust Quantum Factoring

10. Adaptively Sound Zero-Knowledge SNARKs for UP

12. FAB: An FPGA-based Accelerator for Bootstrappable Fully Homomorphic Encryption

13. Succinct Classical Verification of Quantum Computation

14. Planting Undetectable Backdoors in Machine Learning Models

15. Continuous LWE is as Hard as LWE & Applications to Learning Gaussian Mixtures

16. Quantum Advantage from Any Non-Local Game

17. Does Fully Homomorphic Encryption Need Compute Acceleration?

18. The Fine-Grained Hardness of Sparse Linear Regression

19. NeuraCrypt: Hiding Private Health Data via Random Neural Networks for Public Training

20. Oblivious Transfer is in MiniQCrypt

21. Layout Graphs, Random Walks and the t-Wise Independence of SPN Block Ciphers

22. SNARGs and PPAD Hardness from the Decisional Diffie-Hellman Assumption

23. On the Hardness of Average-case k-SUM

24. Data Structures Meet Cryptography: 3SUM with Preprocessing

25. Computational Limitations in Robust Classification and Win-Win Results

29. Witness Encryption and Null-IO from Evasive LWE

30. Locally Verifiable Signature and Key Aggregation

31. Asymptotically Quasi-Optimal Cryptography

33. How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts

34. Gazelle: A Low Latency Framework for Secure Neural Network Inference

35. Homomorphic Encryption Standard

36. Succinct LWE Sampling, Random Polynomials, and Obfuscation

37. Somewhere Statistical Soundness, Post-Quantum Security, and SNARGs

38. The t-wise Independence of Substitution-Permutation Networks

39. Oblivious Transfer Is in MiniQCrypt

40. Fiat-Shamir for Repeated Squaring with Applications to PPAD-Hardness and VDFs

41. Statistical ZAPR Arguments from Bilinear Maps

42. Extracting Randomness from Extractor-Dependent Sources

48. MAD: Memory-Aware Design Techniques for Accelerating Fully Homomorphic Encryption

49. Quantum State Obfuscation from Classical Oracles

50. Optimal Bounded-Collusion Secure Functional Encryption

Catalog

Books, media, physical & digital resources