What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Craig Gentry
Google Scholar
64
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/joc
Achievable CCA2 Relaxation for Homomorphic Encryption.
Adi Akavia
Craig Gentry
Shai Halevi
Margarita Vald
2024
conf/ccs
Fast Two-party Threshold ECDSA with Proactive Security.
Brian Koziel
S. Dov Gordon
Craig Gentry
2022
conf/eurocrypt
Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties.
Craig Gentry
Shai Halevi
Vadim Lyubashevsky
2022
conf/tcc
Achievable CCA2 Relaxation for Homomorphic Encryption.
Adi Akavia
Craig Gentry
Shai Halevi
Margarita Vald
2021
conf/crypto
YOSO: You Only Speak Once - Secure MPC with Stateless Ephemeral Roles.
Craig Gentry
Shai Halevi
Hugo Krawczyk
Bernardo Magri
Jesper Buus Nielsen
Tal Rabin
Sophia Yakoubov
2021
conf/tcc
Random-Index PIR and Applications.
Craig Gentry
Shai Halevi
Bernardo Magri
Jesper Buus Nielsen
Sophia Yakoubov
2020
conf/tcc
Can a Public Blockchain Keep a Secret?
Fabrice Benhamouda
Craig Gentry
Sergey Gorbunov
Shai Halevi
Hugo Krawczyk
Chengyu Lin
Tal Rabin
Leonid Reyzin
2019
journals/popets
Setup-Free Secure Search on Encrypted Data: Faster and Post-Processing Free.
Adi Akavia
Craig Gentry
Shai Halevi
Max Leibovich
2019
conf/asiacrypt
Homomorphic Encryption for Finite Automata.
Nicholas Genise
Craig Gentry
Shai Halevi
Baiyu Li
Daniele Micciancio
2019
conf/tcc
Compressible FHE with Applications to PIR.
Craig Gentry
Shai Halevi
2018
conf/ccs
Doing Real Work with FHE: The Case of Logistic Regression.
Jack L. H. Crawford
Craig Gentry
Shai Halevi
Daniel Platt
Victor Shoup
2018
conf/pkc
A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures.
Craig Gentry
Adam O'Neill
Leonid Reyzin
2017
conf/eurocrypt
Cryptanalyses of Candidate Branching Program Obfuscators.
Yilei Chen
Craig Gentry
Shai Halevi
2016
conf/tcc
Functional Encryption Without Obfuscation.
Sanjam Garg
Craig Gentry
Shai Halevi
Mark Zhandry
2015
journals/joc
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs.
Craig Gentry
Jens Groth
Yuval Ishai
Chris Peikert
Amit Sahai
Adam D. Smith
2015
conf/crypto
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations.
Jean-Sébastien Coron
Craig Gentry
Shai Halevi
Tancrède Lepoint
Hemanta K. Maji
Eric Miles
Mariana Raykova
Amit Sahai
Mehdi Tibouchi
2015
conf/acns
Private Database Access with HE-over-ORAM Architecture.
Craig Gentry
Shai Halevi
Charanjit S. Jutla
Mariana Raykova
2015
conf/tcc
Graph-Induced Multilinear Maps from Lattices.
Craig Gentry
Sergey Gorbunov
Shai Halevi
2014
conf/crypto
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input.
Sanjam Garg
Craig Gentry
Shai Halevi
Daniel Wichs
2014
conf/crypto
Witness Encryption from Instance Independent Assumptions.
Craig Gentry
Allison B. Lewko
Brent Waters
2014
conf/eurocrypt
Garbled RAM Revisited.
Craig Gentry
Shai Halevi
Steve Lu
Rafail Ostrovsky
Mariana Raykova
Daniel Wichs
2014
conf/eurocrypt
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
Dan Boneh
Craig Gentry
Sergey Gorbunov
Shai Halevi
Valeria Nikolaenko
Gil Segev
Vinod Vaikuntanathan
Dhinakaran Vinayagamurthy
2014
conf/tcc
Two-Round Secure MPC from Indistinguishability Obfuscation.
Sanjam Garg
Craig Gentry
Shai Halevi
Mariana Raykova
2013
conf/crypto
Attribute-Based Encryption for Circuits from Multilinear Maps.
Sanjam Garg
Craig Gentry
Shai Halevi
Amit Sahai
Brent Waters
2013
conf/crypto
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
Craig Gentry
Amit Sahai
Brent Waters
2013
conf/sp
Pinocchio: Nearly Practical Verifiable Computation.
Bryan Parno
Jon Howell
Craig Gentry
Mariana Raykova
2013
conf/acns
Private Database Queries Using Somewhat Homomorphic Encryption.
Dan Boneh
Craig Gentry
Shai Halevi
Frank Wang
David J. Wu
2013
conf/pkc
Packed Ciphertexts in LWE-Based Homomorphic Encryption.
Zvika Brakerski
Craig Gentry
Shai Halevi
2013
conf/eurocrypt
Quadratic Span Programs and Succinct NIZKs without PCPs.
Rosario Gennaro
Craig Gentry
Bryan Parno
Mariana Raykova
2013
conf/eurocrypt
Candidate Multilinear Maps from Ideal Lattices.
Sanjam Garg
Craig Gentry
Shai Halevi
2013
conf/asiacrypt
Discrete Gaussian Leftover Hash Lemma over Infinite Domains.
Shweta Agrawal
Craig Gentry
Shai Halevi
Amit Sahai
2013
conf/tcc
Encrypted Messages from the Heights of Cryptomania.
Craig Gentry
2012
conf/crypto
Homomorphic Evaluation of the AES Circuit.
Craig Gentry
Shai Halevi
Nigel P. Smart
2012
conf/pkc
Better Bootstrapping in Fully Homomorphic Encryption.
Craig Gentry
Shai Halevi
Nigel P. Smart
2012
conf/eurocrypt
Fully Homomorphic Encryption with Polylog Overhead.
Craig Gentry
Shai Halevi
Nigel P. Smart
2011
conf/eurocrypt
Implementing Gentry's Fully-Homomorphic Encryption Scheme.
Craig Gentry
Shai Halevi
2010
conf/crypto
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
Rosario Gennaro
Craig Gentry
Bryan Parno
2010
conf/crypto
Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness.
Craig Gentry
2010
conf/crypto
-Hop Homomorphic Encryption and Rerandomizable Yao Circuits.
Craig Gentry
Shai Halevi
Vinod Vaikuntanathan
2010
conf/eurocrypt
Fully Homomorphic Encryption over the Integers.
Marten van Dijk
Craig Gentry
Shai Halevi
Vinod Vaikuntanathan
2010
conf/eurocrypt
A Simple BGN-Type Cryptosystem from LWE.
Craig Gentry
Shai Halevi
Vinod Vaikuntanathan
2009
conf/ccs
Attacking cryptographic schemes based on "perturbation polynomials".
Martin R. Albrecht
Craig Gentry
Shai Halevi
Jonathan Katz
2009
conf/eurocrypt
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts).
Craig Gentry
Brent Waters
2009
conf/tcc
Hierarchical Identity Based Encryption with Polynomially Many Levels.
Craig Gentry
Shai Halevi
2009
conf/cans
Computing on Encrypted Data.
Craig Gentry
2007
conf/ccs
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing.
Alexandra Boldyreva
Craig Gentry
Adam O'Neill
Dae Hyun Yum
2006
conf/crypto
A Method for Making Password-Based Key Exchange Resilient to Server Compromise.
Craig Gentry
Philip D. MacKenzie
Zulfikar Ramzan
2006
conf/pkc
Identity-Based Aggregate Signatures.
Craig Gentry
Zulfikar Ramzan
2006
conf/iwsec
IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures.
James Kempf
Jonathan Wood
Zulfikar Ramzan
Craig Gentry
2006
conf/eurocrypt
Practical Identity-Based Encryption Without Random Oracles.
Craig Gentry
2005
conf/ccs
Password authenticated key exchange using hidden smooth subgroups.
Craig Gentry
Philip D. MacKenzie
Zulfikar Ramzan
2005
conf/crypto
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys.
Dan Boneh
Craig Gentry
Brent Waters
2005
conf/fc
Computation.
Craig Gentry
Zulfikar Ramzan
Stuart G. Stubblebine
2005
conf/asiacrypt
Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs.
Craig Gentry
David Molnar
Zulfikar Ramzan
2004
conf/crypto
How to Compress Rabin Ciphertexts and Signatures (and More).
Craig Gentry
2004
conf/fc
Microcredits for Verifiable Foreign Service Provider Metering.
Craig Gentry
Zulfikar Ramzan
2004
conf/pkc
QuasiModo: Efficient Certificate Validation and Revocation.
Farid F. Elwailly
Craig Gentry
Zulfikar Ramzan
2004
conf/asiacrypt
Eliminating Random Permutation Oracles in the Even-Mansour Cipher.
Craig Gentry
Zulfikar Ramzan
2003
conf/eurocrypt
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps.
Dan Boneh
Craig Gentry
Ben Lynn
Hovav Shacham
2003
conf/eurocrypt
Certificate-Based Encryption and the Certificate Revocation Problem.
Craig Gentry
2002
conf/eurocrypt
Cryptanalysis of the Revised NTRU Signature Scheme.
Craig Gentry
Michael Szydlo
2002
conf/asiacrypt
Hierarchical ID-Based Cryptography.
Craig Gentry
Alice Silverberg
2001
conf/eurocrypt
Key Recovery and Message Attacks on NTRU-Composite.
Craig Gentry
2001
conf/asiacrypt
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001.
Craig Gentry
Jakob Jonsson
Jacques Stern
Michael Szydlo
Coauthors
Adam D. Smith
(1)
Adam O'Neill
(2)
Adi Akavia
(3)
Alexandra Boldyreva
(1)
Alice Silverberg
(1)
Allison B. Lewko
(1)
Amit Sahai
(5)
Baiyu Li
(1)
Ben Lynn
(1)
Bernardo Magri
(2)
Brent Waters
(5)
Brian Koziel
(1)
Bryan Parno
(3)
Charanjit S. Jutla
(1)
Chengyu Lin
(1)
Chris Peikert
(1)
Craig Gentry
(64)
Dae Hyun Yum
(1)
Dan Boneh
(4)
Daniel Platt
(1)
Daniel Wichs
(2)
Daniele Micciancio
(1)
David J. Wu
(1)
David Molnar
(1)
Dhinakaran Vinayagamurthy
(1)
Eric Miles
(1)
Fabrice Benhamouda
(1)
Farid F. Elwailly
(1)
Frank Wang
(1)
Gil Segev
(1)
Hemanta K. Maji
(1)
Hovav Shacham
(1)
Hugo Krawczyk
(2)
Jack L. H. Crawford
(1)
Jacques Stern
(1)
Jakob Jonsson
(1)
James Kempf
(1)
Jean-Sébastien Coron
(1)
Jens Groth
(1)
Jesper Buus Nielsen
(2)
Jon Howell
(1)
Jonathan Katz
(1)
Jonathan Wood
(1)
Leonid Reyzin
(2)
Margarita Vald
(2)
Mariana Raykova
(6)
Mark Zhandry
(1)
Marten van Dijk
(1)
Martin R. Albrecht
(1)
Max Leibovich
(1)
Mehdi Tibouchi
(1)
Michael Szydlo
(2)
Nicholas Genise
(1)
Nigel P. Smart
(3)
Philip D. MacKenzie
(2)
Rafail Ostrovsky
(1)
Rosario Gennaro
(2)
S. Dov Gordon
(1)
Sanjam Garg
(5)
Sergey Gorbunov
(3)
Shai Halevi
(33)
Shweta Agrawal
(1)
Sophia Yakoubov
(2)
Steve Lu
(1)
Stuart G. Stubblebine
(1)
Tal Rabin
(2)
Tancrède Lepoint
(1)
Vadim Lyubashevsky
(1)
Valeria Nikolaenko
(1)
Victor Shoup
(1)
Vinod Vaikuntanathan
(4)
Yilei Chen
(1)
Yuval Ishai
(1)
Zulfikar Ramzan
(9)
Zvika Brakerski
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to