What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Brent Waters
Google Scholar
155
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/pkc
Accountable Multi-signatures with Constant Size Public Keys.
Dan Boneh
Aditi Partap
Brent Waters
2025
conf/pkc
Adaptively-Secure Big-Key Identity-Based Encryption.
Jeffrey Champion
Brent Waters
David J. Wu
2025
conf/pkc
Monotone-Policy BARGs and More from BARGs and Quadratic Residuosity.
Shafik Nassar
Brent Waters
David J. Wu
2025
conf/eurocrypt
Multi-authority Registered Attribute-Based Encryption.
George Lu
Brent Waters
David J. Wu
2025
conf/eurocrypt
New Techniques for Preimage Sampling: Improved NIZKs and More from LWE.
Brent Waters
Hoeteck Wee
David J. Wu
2025
conf/eurocrypt
A Generic Approach to Adaptively-Secure Broadcast Encryption in the Plain Model.
Yao-Ching Hsieh
Brent Waters
David J. Wu
2025
conf/crypto
How to Make Any Computational Secret Sharing Scheme Adaptively Secure.
George Lu
Brent Waters
2025
conf/crypto
A Pure Indistinguishability Obfuscation Approach to Adaptively-Sound SNARGs for sfNP.
Brent Waters
David J. Wu
2024
conf/crypto
Adaptive Security in SNARGs via iO and Lossy Functions.
Brent Waters
Mark Zhandry
2024
conf/crypto
Reducing the CRS Size in Registered ABE Systems.
Rachit Garg
George Lu
Brent Waters
David J. Wu
2024
conf/tcc
Batching Adaptively-Sound SNARGs for NP.
Lalita Devadas
Brent Waters
David J. Wu
2024
conf/tcc
Batch Arguments to NIZKs from One-Way Functions.
Eli Bradley
Brent Waters
David J. Wu
2024
conf/tcc
Monotone Policy BARGs from BARGs and Additively Homomorphic Encryption.
Shafik Nassar
Brent Waters
David J. Wu
2024
conf/tcc
Adaptively Secure Attribute-Based Encryption from Witness Encryption.
Brent Waters
Daniel Wichs
2023
journals/joc
Decentralized Multi-authority ABE for sfNC<sup>1</sup> from BDH.
Pratish Datta
Ilan Komargodski
Brent Waters
2023
conf/ccs
Realizing Flexible Broadcast Encryption: How to Broadcast to a Public-Key Directory.
Rachit Garg
George Lu
Brent Waters
David J. Wu
2023
conf/crypto
How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More.
Cody Freitag
Brent Waters
David J. Wu
2023
conf/crypto
Universal Amplification of KDM Security: From 1-Key Circular to Multi-Key KDM.
Brent Waters
Daniel Wichs
2023
conf/crypto
Security-Preserving Distributed Samplers: How to Generate Any CRS in One Round Without Random Oracles.
Damiano Abram
Brent Waters
Mark Zhandry
2023
conf/pkc
Non-Interactive Publicly-Verifiable Delegation of Committed Programs.
Riddhi Ghosal
Amit Sahai
Brent Waters
2023
conf/eurocrypt
Fully Adaptive Decentralized Multi-Authority ABE.
Pratish Datta
Ilan Komargodski
Brent Waters
2023
conf/eurocrypt
Registered Attribute-Based Encryption.
Susan Hohenberger
George Lu
Brent Waters
David J. Wu
2023
conf/eurocrypt
On Non-uniform Security for Black-Box Non-interactive CCA Commitments.
Rachit Garg
Dakshita Khurana
George Lu
Brent Waters
2023
conf/tcc
Non-Interactive Anonymous Router with Quasi-Linear Router Computation.
Rex Fernando
Elaine Shi
Pratik Soni
Nikhil Vanjani
Brent Waters
2022
conf/crypto
Batch Arguments for sfNP and More from Standard Bilinear Group Assumptions.
Brent Waters
David J. Wu
2022
conf/eurocrypt
Dynamic Collusion Bounded Functional Encryption from Identity-Based Encryption.
Rachit Garg
Rishab Goyal
George Lu
Brent Waters
2022
conf/tcc
Multi-authority ABE from Lattices Without Random Oracles.
Brent Waters
Hoeteck Wee
David J. Wu
2022
conf/tcc
Fully Succinct Batch Arguments for sfNP from Indistinguishability Obfuscation.
Rachit Garg
Kristin Sheridan
Brent Waters
David J. Wu
2022
conf/tcc
Adaptive Multiparty NIKE.
Venkata Koppula
Brent Waters
Mark Zhandry
2022
conf/tcc
How to Sample a Discrete Gaussian (and more) from a Random Oracle.
George Lu
Brent Waters
2021
conf/crypto
Targeted Lossy Functions and Applications.
Willy Quach
Brent Waters
Daniel Wichs
2021
conf/pkc
On the CCA Compatibility of Public-Key Infrastructure.
Dakshita Khurana
Brent Waters
2021
conf/eurocrypt
Decentralized Multi-authority ABE for DNFs from LWE.
Pratish Datta
Ilan Komargodski
Brent Waters
2021
conf/eurocrypt
Black-Box Non-interactive Non-malleable Commitments.
Rachit Garg
Dakshita Khurana
George Lu
Brent Waters
2021
conf/asiacrypt
Bounded Collusion ABE for TMs from IBE.
Rishab Goyal
Ridwan Syed
Brent Waters
2021
conf/asiacrypt
Beyond Software Watermarking: Traitor-Tracing for Pseudorandom Functions.
Rishab Goyal
Sam Kim
Brent Waters
David J. Wu
2021
conf/asiacrypt
Adaptive Security via Deletion in Attribute-Based Encryption: Solutions from Search Assumptions in Bilinear Groups.
Rishab Goyal
Jiahui Liu
Brent Waters
2020
conf/ccs
PPE Circuits: Formal Definition to Software Automation.
Susan Hohenberger
Satyanarayana Vusirikala
Brent Waters
2020
conf/crypto
Chosen Ciphertext Security from Injective Trapdoor Functions.
Susan Hohenberger
Venkata Koppula
Brent Waters
2020
conf/crypto
New Constructions of Hinting PRGs, OWFs with Encryption, and More.
Rishab Goyal
Satyanarayana Vusirikala
Brent Waters
2020
conf/acns
New Methods and Abstractions for RSA-Based Forward Secure Signatures.
Susan Hohenberger
Brent Waters
2020
conf/tcc
New Techniques in Replica Encodings with Client Setup.
Rachit Garg
George Lu
Brent Waters
2020
conf/tcc
On Perfect Correctness in (Lockable) Obfuscation.
Rishab Goyal
Venkata Koppula
Satyanarayana Vusirikala
Brent Waters
2019
conf/crypto
Watermarking Public-Key Cryptographic Primitives.
Rishab Goyal
Sam Kim
Nathan Manohar
Brent Waters
David J. Wu
2019
conf/crypto
Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption.
Venkata Koppula
Brent Waters
2019
conf/crypto
ABE for DFA from k-Lin.
Junqing Gong
Brent Waters
Hoeteck Wee
2019
conf/crypto
Broadcast and Trace with N^ε Ciphertext Size from Standard Assumptions.
Rishab Goyal
Willy Quach
Brent Waters
Daniel Wichs
2019
conf/fc
Adaptively Secure Constrained Pseudorandom Functions.
Dennis Hofheinz
Akshay Kamath
Venkata Koppula
Brent Waters
2019
conf/pkc
Collusion Resistant Broadcast and Trace from Positional Witness Encryption.
Rishab Goyal
Satyanarayana Vusirikala
Brent Waters
2019
conf/asiacrypt
Output Compression, MPC, and iO for Turing Machines.
Saikrishna Badrinarayanan
Rex Fernando
Venkata Koppula
Amit Sahai
Brent Waters
2019
conf/tcc
New Approaches to Traitor Tracing with Embedded Identities.
Rishab Goyal
Venkata Koppula
Brent Waters
2018
conf/crypto
Risky Traitor Tracing and New Differential Privacy Negative Results.
Rishab Goyal
Venkata Koppula
Andrew Russell
Brent Waters
2018
conf/eurocrypt
Synchronized Aggregate Signatures from the RSA Assumption.
Susan Hohenberger
Brent Waters
2018
conf/tcc
Upgrading to Functional Encryption.
Saikrishna Badrinarayanan
Dakshita Khurana
Amit Sahai
Brent Waters
2018
conf/tcc
Traitor-Tracing from LWE Made Simple and Attribute-Based.
Yilei Chen
Vinod Vaikuntanathan
Brent Waters
Hoeteck Wee
Daniel Wichs
2018
conf/tcc
Impossibility of Simulation Secure Functional Encryption Even with Random Oracles.
Shashank Agrawal
Venkata Koppula
Brent Waters
2017
conf/acns
Signature Schemes with Randomized Verification.
Cody Freitag
Rishab Goyal
Susan Hohenberger
Venkata Koppula
Eysa Lee
Tatsuaki Okamoto
Jordan Tran
Brent Waters
2017
conf/pkc
Universal Samplers with Fast Verification.
Venkata Koppula
Andrew Poelstra
Brent Waters
2017
conf/pkc
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles.
Rishab Goyal
Venkata Koppula
Brent Waters
2017
conf/eurocrypt
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption.
Rishab Goyal
Venkata Koppula
Brent Waters
2017
conf/tcc
A Generic Approach to Constructing and Proving Verifiable Random Functions.
Rishab Goyal
Susan Hohenberger
Venkata Koppula
Brent Waters
2016
conf/crypto
Circular Security Separations for Arbitrary Length Cycles from LWE.
Venkata Koppula
Brent Waters
2016
conf/acns
Deterministic Public-Key Encryption Under Continual Leakage.
Venkata Koppula
Omkant Pandey
Yannis Rouselakis
Brent Waters
2016
conf/eurocrypt
New Negative Results on Differing-Inputs Obfuscation.
Mihir Bellare
Igors Stepanovs
Brent Waters
2016
conf/eurocrypt
Constrained Pseudorandom Functions for Unconstrained Inputs.
Apoorvaa Deshpande
Venkata Koppula
Brent Waters
2016
conf/asiacrypt
How to Generate and Use Universal Samplers.
Dennis Hofheinz
Tibor Jager
Dakshita Khurana
Amit Sahai
Brent Waters
Mark Zhandry
2016
conf/tcc
Semi-adaptive Security and Bundling Functionalities Made Generic and Easy.
Rishab Goyal
Venkata Koppula
Brent Waters
2015
journals/joc
Computing on Authenticated Data.
Jae Hyun Ahn
Dan Boneh
Jan Camenisch
Susan Hohenberger
Abhi Shelat
Brent Waters
2015
conf/crypto
A Punctured Programming Approach to Adaptively Secure Functional Encryption.
Brent Waters
2015
conf/fc
Efficient Statically-Secure Large-Universe Multi-Authority Attribute-Based Encryption.
Yannis Rouselakis
Brent Waters
2015
conf/eurocrypt
Universal Signature Aggregators.
Susan Hohenberger
Venkata Koppula
Brent Waters
2015
conf/asiacrypt
New Circular Security Counterexamples from Decision Linear and Learning with Errors.
Allison Bishop
Susan Hohenberger
Brent Waters
2015
conf/asiacrypt
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators.
Tatsuaki Okamoto
Krzysztof Pietrzak
Brent Waters
Daniel Wichs
2015
conf/asiacrypt
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model.
Susan Hohenberger
Venkata Koppula
Brent Waters
2015
conf/tcc
Separations in Circular Security for Arbitrary Length Key Cycles.
Venkata Koppula
Kim Ramchen
Brent Waters
2014
conf/ccs
Fully Secure and Fast Signing from Obfuscation.
Kim Ramchen
Brent Waters
2014
conf/crypto
Low Overhead Broadcast Encryption from Multilinear Maps.
Dan Boneh
Brent Waters
Mark Zhandry
2014
conf/crypto
Witness Encryption from Instance Independent Assumptions.
Craig Gentry
Allison B. Lewko
Brent Waters
2014
conf/pkc
Online/Offline Attribute-Based Encryption.
Susan Hohenberger
Brent Waters
2014
conf/ctrsa
Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions.
Theresa Calderon
Sarah Meiklejohn
Hovav Shacham
Brent Waters
2014
conf/eurocrypt
Why Proving HIBE Systems Secure Is Difficult.
Allison B. Lewko
Brent Waters
2014
conf/eurocrypt
Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation.
Susan Hohenberger
Amit Sahai
Brent Waters
2013
journals/joc
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products.
Jonathan Katz
Amit Sahai
Brent Waters
2013
journals/joc
Compact Proofs of Retrievability.
Hovav Shacham
Brent Waters
2013
journals/joc
Sequential Aggregate Signatures, Multisignatures, and Verifiably Encrypted Signatures Without Random Oracles.
Steve Lu
Rafail Ostrovsky
Amit Sahai
Hovav Shacham
Brent Waters
2013
conf/ccs
Practical constructions and new proof methods for large universe attribute-based encryption.
Yannis Rouselakis
Brent Waters
2013
conf/crypto
Attribute-Based Encryption for Circuits from Multilinear Maps.
Sanjam Garg
Craig Gentry
Shai Halevi
Amit Sahai
Brent Waters
2013
conf/crypto
Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys.
Benny Applebaum
Yuval Ishai
Eyal Kushilevitz
Brent Waters
2013
conf/crypto
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures.
Susan Hohenberger
Amit Sahai
Brent Waters
2013
conf/crypto
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
Craig Gentry
Amit Sahai
Brent Waters
2013
conf/sp
Anon-Pass: Practical Anonymous Subscriptions.
Michael Z. Lee
Alan M. Dunn
Brent Waters
Emmett Witchel
Jonathan Katz
2013
conf/pkc
Attribute-Based Encryption with Fast Decryption.
Susan Hohenberger
Brent Waters
2013
conf/pkc
Functional Encryption: Origins and Recent Developments.
Brent Waters
2013
conf/ctrsa
The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions.
Karyn Benson
Hovav Shacham
Brent Waters
2013
conf/asiacrypt
Constrained Pseudorandom Functions and Their Applications.
Dan Boneh
Brent Waters
2012
conf/crypto
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption.
Amit Sahai
Hakan Seyalioglu
Brent Waters
2012
conf/crypto
Functional Encryption for Regular Languages.
Brent Waters
2012
conf/crypto
New Proof Methods for Attribute-Based Encryption: Achieving Full Security through Selective Techniques.
Allison B. Lewko
Brent Waters
2012
conf/eurocrypt
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security.
Susan Hohenberger
Allison B. Lewko
Brent Waters
2012
conf/eurocrypt
Identity-Based (Lossy) Trapdoor Functions and Applications.
Mihir Bellare
Eike Kiltz
Chris Peikert
Brent Waters
2012
conf/eurocrypt
Standard Security Does Not Imply Security against Selective-Opening.
Mihir Bellare
Rafael Dowsley
Brent Waters
Scott Yilek
2012
conf/asiacrypt
Dual Form Signatures: An Approach for Proving Security from Static Assumptions.
Michael Gerbush
Allison B. Lewko
Adam O'Neill
Brent Waters
2012
conf/tcc
Computing on Authenticated Data.
Jae Hyun Ahn
Dan Boneh
Jan Camenisch
Susan Hohenberger
Abhi Shelat
Brent Waters
2011
conf/uss
Outsourcing the Decryption of ABE Ciphertexts.
Matthew Green
Susan Hohenberger
Brent Waters
2011
conf/uss
Cloaking Malware with the Trusted Platform Module.
Alan M. Dunn
Owen S. Hofmann
Brent Waters
Emmett Witchel
2011
conf/crypto
Bi-Deniable Public-Key Encryption.
Adam O'Neill
Chris Peikert
Brent Waters
2011
conf/pkc
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization.
Brent Waters
2011
conf/eurocrypt
Decentralizing Attribute-Based Encryption.
Allison B. Lewko
Brent Waters
2011
conf/eurocrypt
Unbounded HIBE and Attribute-Based Encryption.
Allison B. Lewko
Brent Waters
2011
conf/tcc
Functional Encryption: Definitions and Challenges.
Dan Boneh
Amit Sahai
Brent Waters
2011
conf/tcc
Identity-Based Encryption Secure against Selective Opening Attack.
Mihir Bellare
Brent Waters
Scott Yilek
2011
conf/tcc
Achieving Leakage Resilience through Dual System Encryption.
Allison B. Lewko
Yannis Rouselakis
Brent Waters
2010
conf/ccs
Practical leakage-resilient identity-based encryption from simple assumptions.
Sherman S. M. Chow
Yevgeniy Dodis
Yannis Rouselakis
Brent Waters
2010
conf/ccs
Building efficient fully collusion-resilient traitor tracing and revocation schemes.
Sanjam Garg
Abishek Kumarasubramanian
Amit Sahai
Brent Waters
2010
conf/sp
Revocation Systems with Very Small Private Keys.
Allison B. Lewko
Amit Sahai
Brent Waters
2010
conf/acns
Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions.
Xavier Boyen
Brent Waters
2010
conf/ndss
Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.
Scott Wolchok
Owen S. Hofmann
Nadia Heninger
Edward W. Felten
J. Alex Halderman
Christopher J. Rossbach
Brent Waters
Emmett Witchel
2010
conf/eurocrypt
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
Allison B. Lewko
Tatsuaki Okamoto
Amit Sahai
Katsuyuki Takashima
Brent Waters
2010
conf/eurocrypt
Constructing Verifiable Random Functions with Large Input Spaces.
Susan Hohenberger
Brent Waters
2010
conf/tcc
New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts.
Allison B. Lewko
Brent Waters
2009
conf/ccs
Efficient pseudorandom functions from the decisional linear assumption and weaker variants.
Allison B. Lewko
Brent Waters
2009
conf/crypto
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions.
Brent Waters
2009
conf/crypto
Short and Stateless Signatures from the RSA Assumption.
Susan Hohenberger
Brent Waters
2009
conf/pkc
Signing a Linear Subspace: Signature Schemes for Network Coding.
Dan Boneh
David Mandell Freeman
Jonathan Katz
Brent Waters
2009
conf/eurocrypt
Realizing Hash-and-Sign Signatures under Standard Assumptions.
Susan Hohenberger
Brent Waters
2009
conf/eurocrypt
Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts).
Craig Gentry
Brent Waters
2009
conf/tcc
Predicate Privacy in Encryption Systems.
Emily Shen
Elaine Shi
Brent Waters
2008
conf/ccs
Black-box accountable authority identity-based encryption.
Vipul Goyal
Steve Lu
Amit Sahai
Brent Waters
2008
conf/crypto
A Framework for Efficient and Composable Oblivious Transfer.
Chris Peikert
Vinod Vaikuntanathan
Brent Waters
2008
conf/ndss
Analysis-Resistant Malware.
John Bethencourt
Dawn Song
Brent Waters
2008
conf/eurocrypt
Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products.
Jonathan Katz
Amit Sahai
Brent Waters
2008
conf/asiacrypt
Compact Proofs of Retrievability.
Hovav Shacham
Brent Waters
2007
conf/ccs
Attribute-based encryption with non-monotonic access structures.
Rafail Ostrovsky
Amit Sahai
Brent Waters
2007
conf/ccs
Harvesting verifiable challenges from oblivious online sources.
J. Alex Halderman
Brent Waters
2007
conf/sp
Ciphertext-Policy Attribute-Based Encryption.
John Bethencourt
Amit Sahai
Brent Waters
2007
conf/ndss
Cryptographic Methods for Storing Ballots on a Voting Machine.
John Bethencourt
Dan Boneh
Brent Waters
2007
conf/pkc
Full-Domain Subgroup Hiding and Constant-Size Group Signatures.
Xavier Boyen
Brent Waters
2007
conf/pkc
Efficient Ring Signatures Without Random Oracles.
Hovav Shacham
Brent Waters
2007
conf/tcc
Conjunctive, Subset, and Range Queries on Encrypted Data.
Dan Boneh
Brent Waters
2006
conf/ccs
Attribute-based encryption for fine-grained access control of encrypted data.
Vipul Goyal
Omkant Pandey
Amit Sahai
Brent Waters
2006
conf/ccs
A fully collusion resistant broadcast, trace, and revoke system.
Dan Boneh
Brent Waters
2006
conf/ccs
Forward-secure signatures with untrusted update.
Xavier Boyen
Hovav Shacham
Emily Shen
Brent Waters
2006
conf/ccs
Secure attribute-based systems.
Matthew Pirretti
Patrick Traynor
Patrick D. McDaniel
Brent Waters
2006
conf/crypto
Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles).
Xavier Boyen
Brent Waters
2006
conf/fc
Privacy in Encrypted Content Distribution Using Private Broadcast Encryption.
Adam Barth
Dan Boneh
Brent Waters
2006
conf/sp
New Constructions and Practical Applications for Private Stream Searching (Extended Abstract).
John Bethencourt
Dawn Xiaodong Song
Brent Waters
2006
conf/pkc
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman.
Dan Boneh
Emily Shen
Brent Waters
2006
conf/eurocrypt
Compact Group Signatures Without Random Oracles.
Xavier Boyen
Brent Waters
2006
conf/eurocrypt
Sequential Aggregate Signatures and Multisignatures Without Random Oracles.
Steve Lu
Rafail Ostrovsky
Amit Sahai
Hovav Shacham
Brent Waters
2006
conf/eurocrypt
Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys.
Dan Boneh
Amit Sahai
Brent Waters
2005
conf/ccs
Direct chosen ciphertext security from identity-based techniques.
Xavier Boyen
Qixiang Mei
Brent Waters
2005
conf/crypto
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys.
Dan Boneh
Craig Gentry
Brent Waters
2005
conf/eurocrypt
Fuzzy Identity-Based Encryption.
Amit Sahai
Brent Waters
2005
conf/eurocrypt
Efficient Identity-Based Encryption Without Random Oracles.
Brent Waters
2004
conf/ccs
New client puzzle outsourcing techniques for DoS resistance.
Brent Waters
Ari Juels
J. Alex Halderman
Edward W. Felten
Coauthors
Abhi Shelat
(2)
Abishek Kumarasubramanian
(1)
Adam Barth
(1)
Adam O'Neill
(2)
Aditi Partap
(1)
Akshay Kamath
(1)
Alan M. Dunn
(2)
Allison B. Lewko
(12)
Allison Bishop
(1)
Amit Sahai
(23)
Andrew Poelstra
(1)
Andrew Russell
(1)
Apoorvaa Deshpande
(1)
Ari Juels
(1)
Benny Applebaum
(1)
Brent Waters
(155)
Chris Peikert
(3)
Christopher J. Rossbach
(1)
Cody Freitag
(2)
Craig Gentry
(5)
Dakshita Khurana
(5)
Damiano Abram
(1)
Dan Boneh
(14)
Daniel Wichs
(6)
David J. Wu
(18)
David Mandell Freeman
(1)
Dawn Song
(1)
Dawn Xiaodong Song
(1)
Dennis Hofheinz
(2)
Edward W. Felten
(2)
Eike Kiltz
(1)
Elaine Shi
(2)
Eli Bradley
(1)
Emily Shen
(3)
Emmett Witchel
(3)
Eyal Kushilevitz
(1)
Eysa Lee
(1)
George Lu
(10)
Hakan Seyalioglu
(1)
Hoeteck Wee
(4)
Hovav Shacham
(8)
Igors Stepanovs
(1)
Ilan Komargodski
(3)
J. Alex Halderman
(3)
Jae Hyun Ahn
(2)
Jan Camenisch
(2)
Jeffrey Champion
(1)
Jiahui Liu
(1)
John Bethencourt
(4)
Jonathan Katz
(4)
Jordan Tran
(1)
Junqing Gong
(1)
Karyn Benson
(1)
Katsuyuki Takashima
(1)
Kim Ramchen
(2)
Kristin Sheridan
(1)
Krzysztof Pietrzak
(1)
Lalita Devadas
(1)
Mark Zhandry
(5)
Matthew Green
(1)
Matthew Pirretti
(1)
Michael Gerbush
(1)
Michael Z. Lee
(1)
Mihir Bellare
(4)
Nadia Heninger
(1)
Nathan Manohar
(1)
Nikhil Vanjani
(1)
Omkant Pandey
(2)
Owen S. Hofmann
(2)
Patrick D. McDaniel
(1)
Patrick Traynor
(1)
Pratik Soni
(1)
Pratish Datta
(3)
Qixiang Mei
(1)
Rachit Garg
(7)
Rafael Dowsley
(1)
Rafail Ostrovsky
(3)
Rex Fernando
(2)
Riddhi Ghosal
(1)
Ridwan Syed
(1)
Rishab Goyal
(16)
Saikrishna Badrinarayanan
(2)
Sam Kim
(2)
Sanjam Garg
(2)
Sarah Meiklejohn
(1)
Satyanarayana Vusirikala
(4)
Scott Wolchok
(1)
Scott Yilek
(2)
Shafik Nassar
(2)
Shai Halevi
(1)
Shashank Agrawal
(1)
Sherman S. M. Chow
(1)
Steve Lu
(3)
Susan Hohenberger
(21)
Tatsuaki Okamoto
(3)
Theresa Calderon
(1)
Tibor Jager
(1)
Venkata Koppula
(21)
Vinod Vaikuntanathan
(2)
Vipul Goyal
(2)
Willy Quach
(2)
Xavier Boyen
(6)
Yannis Rouselakis
(5)
Yao-Ching Hsieh
(1)
Yevgeniy Dodis
(1)
Yilei Chen
(1)
Yuval Ishai
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to