Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Craig Gentry
Search web for home page
Program Committees
1
2011
Crypto
pc
2
2011
Asiacrypt
pc
3
2010
PKC
pc
4
2009
Eurocrypt
pc
5
2008
Crypto
pc
6
2008
PKC
pc
7
2007
Asiacrypt
pc
8
2005
Crypto
pc
9
2003
CHES
pc
10
2002
CHES
pc
Publications
year
title
booktitle
pages
1
2012
Homomorphic Evaluation of the AES Circuit
crypto
850-867
2
2012
Better Bootstrapping in Fully Homomorphic Encryption
pkc
1-16
3
2012
Fully Homomorphic Encryption with Polylog Overhead
eurocrypt
465-482
4
2011
Implementing Gentry's Fully-Homomorphic Encryption Scheme
eurocrypt
129
5
2010
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
eprint
online
6
2010
A Simple BGN-type Cryptosystem from LWE
eprint
online
7
2010
i
-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
crypto
155-172
8
2010
Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness
crypto
116-137
9
2010
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers
crypto
465-482
10
2010
A Simple BGN-Type Cryptosystem from LWE
eurocrypt
506-522
11
2010
Fully Homomorphic Encryption over the Integers
eurocrypt
24-43
12
2009
Attacking Cryptographic Schemes Based on "Perturbation Polynomials"
eprint
online
13
2009
Hierarchical Identity Based Encryption with Polynomially Many Levels
tcc
437-456
14
2009
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts)
eurocrypt
171-188
15
2008
Adaptive Security in Broadcast Encryption Systems
eprint
online
16
2007
Trapdoors for Hard Lattices and New Cryptographic Constructions
eprint
online
17
2007
Space-Efficient Identity Based Encryption Without Pairings
eprint
online
18
2007
Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing
eprint
online
19
2006
Identity-Based Aggregate Signatures
pkc
online
20
2006
Practical Identity-Based Encryption Without Random Oracles
eurocrypt
online
21
2006
A Method for Making Password-Based Key Exchange Resilient to Server Compromise
crypto
online
22
2005
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
crypto
online
23
2005
Collusion Resistant Broadcast Encryption With Short Ciphertexts and Private Keys
eprint
online
24
2005
Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs
asiacrypt
online
25
2004
How to Compress Rabin Ciphertexts and Signatures (and More)
crypto
online
26
2004
Eliminating Random Permutation Oracles in the Even-Mansour Cipher
asiacrypt
online
27
2004
QuasiModo: Efficient Certificate Validation and Revocation
pkc
online
28
2003
Certificate-Based Encryption and the Certificate Revocation Problem
eurocrypt
online
29
2003
Certificate-Based Encryption and the Certificate Revocation Problem
eprint
online
30
2003
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
eurocrypt
online
31
2002
Cryptanalysis of the Revised NTRU Signature Scheme
eurocrypt
online
32
2002
Hierarchical ID-Based Cryptography
eprint
online
33
2002
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
eprint
online
34
2002
Hierarchical ID-Based Cryptography
asiacrypt
online
35
2001
Key Recovery and Message Attacks on NTRU-Composite
eurocrypt
182-194
36
2001
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001
asiacrypt
1-20
Coauthors of Craig Gentry
Martin R. Albrecht
Alexandra Boldyreva
Dan Boneh
Marten van Dijk
Farid F. Elwailly
Rosario Gennaro
Shai Halevi
Michael Hamburg
Jakob Jonsson
Jonathan Katz
Ben Lynn
Philip D. MacKenzie
David Molnar
Adam O'Neill
Bryan Parno
Chris Peikert
Zulfikar Ramzan
Hovav Shacham
Alice Silverberg
Nigel P. Smart
Jacques Stern
Michael Szydlo
Vinod Vaikuntanathan
Brent Waters
Dae Hyun Yum