What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mark Zhandry
Google Scholar
ORCID:
0000-0001-7071-6272
74
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurocrypt
Optimal Traitor Tracing from Pairings.
Mark Zhandry
2025
conf/eurocrypt
On Quantum Money and Evasive Obfuscation.
Mark Zhandry
2025
conf/eurocrypt
Hard Quantum Extrapolations in Quantum Cryptography.
Luowen Qian
Justin Raizes
Mark Zhandry
2025
conf/crypto
Translating Between the Common Haar Random State Model and the Unitary Model.
Eli Goldin
Mark Zhandry
2025
conf/crypto
Quantum State Group Actions.
Saachi Mutreja
Mark Zhandry
2025
conf/crypto
On One-Shot Signatures, Quantum vs. Classical Binding, and Obfuscating Permutations.
Omri Shmueli
Mark Zhandry
2025
conf/crypto
How to Model Unitary Oracles.
Mark Zhandry
2024
journals/joc
Full Quantum Equivalence of Group Action DLog and CDH, and More.
Hart Montgomery
Mark Zhandry
2024
conf/crypto
Adaptive Security in SNARGs via iO and Lossy Functions.
Brent Waters
Mark Zhandry
2024
conf/crypto
Limits on the Power of Prime-Order Groups: Separating Q-Type from Static Assumptions.
George Lu
Mark Zhandry
2024
conf/tcc
Composability in Watermarking Schemes.
Jiahui Liu
Mark Zhandry
2023
conf/crypto
Computational Wiretap Coding from Indistinguishability Obfuscation.
Yuval Ishai
Aayush Jain
Paul Lou
Amit Sahai
Mark Zhandry
2023
conf/crypto
Tracing Quantum State Distinguishers via Backtracking.
Mark Zhandry
2023
conf/crypto
Security-Preserving Distributed Samplers: How to Generate Any CRS in One Round Without Random Oracles.
Damiano Abram
Brent Waters
Mark Zhandry
2023
conf/eurocrypt
Another Round of Breaking and Making Quantum Money: - How to Not Build It from Lattices, and More.
Jiahui Liu
Hart Montgomery
Mark Zhandry
2023
conf/eurocrypt
A Lower Bound on the Length of Signatures Based on Group Actions and Generic Isogenies.
Dan Boneh
Jiaxin Guan
Mark Zhandry
2023
conf/asiacrypt
The Relationship Between Idealized Models Under Computationally Bounded Adversaries.
Cong Zhang
Mark Zhandry
2023
conf/tcc
Multi-instance Randomness Extraction and Security Against Bounded-Storage Mass Surveillance.
Jiaxin Guan
Daniel Wichs
Mark Zhandry
2022
conf/crypto
Augmented Random Oracles.
Mark Zhandry
2022
conf/crypto
To Label, or Not To Label (in Generic Groups).
Mark Zhandry
2022
conf/crypto
On the Feasibility of Unclonable Encryption, and More.
Prabhanjan Ananth
Fatih Kaleoglu
Xingjian Li
Qipeng Liu
Mark Zhandry
2022
conf/crypto
New Constructions of Collapsing Hashes.
Mark Zhandry
2022
conf/eurocrypt
Incompressible Cryptography.
Jiaxin Guan
Daniel Wichs
Mark Zhandry
2022
conf/eurocrypt
Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering.
Yilei Chen
Qipeng Liu
Mark Zhandry
2022
conf/asiacrypt
Full Quantum Equivalence of Group Action DLog and CDH, and More.
Hart Montgomery
Mark Zhandry
2022
conf/tcc
Collusion Resistant Copy-Protection for Watermarkable Functionalities.
Jiahui Liu
Qipeng Liu
Luowen Qian
Mark Zhandry
2022
conf/tcc
Adaptive Multiparty NIKE.
Venkata Koppula
Brent Waters
Mark Zhandry
2021
journals/joc
Quantum Lightning Never Strikes the Same State Twice. Or: Quantum Money from Cryptographic Assumptions.
Mark Zhandry
2021
journals/joc
Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness.
Qipeng Liu
Mark Zhandry
2021
conf/crypto
New Approaches for Quantum Copy-Protection.
Scott Aaronson
Jiahui Liu
Qipeng Liu
Mark Zhandry
Ruizhe Zhang
2021
conf/crypto
White Box Traitor Tracing.
Mark Zhandry
2021
conf/crypto
Hidden Cosets and Applications to Unclonable Cryptography.
Andrea Coladangelo
Jiahui Liu
Qipeng Liu
Mark Zhandry
2021
conf/eurocrypt
Classical vs Quantum Random Oracles.
Takashi Yamakawa
Mark Zhandry
2021
conf/asiacrypt
Redeeming Reset Indifferentiability and Applications to Post-quantum Security.
Mark Zhandry
2021
conf/asiacrypt
Franchised Quantum Money.
Bhaskar Roberts
Mark Zhandry
2021
conf/tcc
Disappearing Cryptography in the Bounded Storage Model.
Jiaxin Guan
Mark Zhandry
2020
conf/crypto
Indifferentiability for Public Key Cryptosystems.
Mark Zhandry
Cong Zhang
2020
conf/crypto
New Techniques for Traitor Tracing: Size N<sup>1/3</sup> and More from Pairings.
Mark Zhandry
2020
conf/tcc
Towards Non-interactive Witness Hiding.
Benjamin Kuykendall
Mark Zhandry
2020
conf/tcc
Schrödinger's Pirate: How to Trace a Quantum Decoder.
Mark Zhandry
2019
journals/joc
The Magic of ELFs.
Mark Zhandry
2019
conf/crypto
The Distinction Between Fixed and Random Generators in Group-Based Assumptions.
James Bartusek
Fermi Ma
Mark Zhandry
2019
conf/crypto
How to Record Quantum Queries, and Applications to Quantum Indifferentiability.
Mark Zhandry
2019
conf/crypto
Revisiting Post-quantum Fiat-Shamir.
Qipeng Liu
Mark Zhandry
2019
conf/eurocrypt
Quantum Lightning Never Strikes the Same State Twice.
Mark Zhandry
2019
conf/eurocrypt
New Techniques for Obfuscating Conjunctions.
James Bartusek
Tancrède Lepoint
Fermi Ma
Mark Zhandry
2019
conf/eurocrypt
Simple Schemes in the Bounded Storage Model.
Jiaxin Guan
Mark Zhandry
2019
conf/eurocrypt
On ELFs, Deterministic Encryption, and Correlated-Input Security.
Mark Zhandry
2019
conf/eurocrypt
On Finding Quantum Multi-collisions.
Qipeng Liu
Mark Zhandry
2018
conf/asiacrypt
Parameter-Hiding Order Revealing Encryption.
David Cash
Feng-Hao Liu
Adam O'Neill
Mark Zhandry
Cong Zhang
2018
conf/tcc
Impossibility of Order-Revealing Encryption in Idealized Models.
Mark Zhandry
Cong Zhang
2018
conf/tcc
The MMap Strikes Back: Obfuscation and New Multilinear Maps Immune to CLT13 Zeroizing Attacks.
Fermi Ma
Mark Zhandry
2018
conf/tcc
Return of GGH15: Provable Security Against Zeroizing Attacks.
James Bartusek
Jiaxin Guan
Fermi Ma
Mark Zhandry
2017
conf/crypto
New Security Notions and Feasibility Results for Authentication of Quantum Data.
Sumegha Garg
Henry Yuen
Mark Zhandry
2017
conf/eurocrypt
Breaking the Sub-Exponential Barrier in Obfustopia.
Sanjam Garg
Omkant Pandey
Akshayaram Srinivasan
Mark Zhandry
2017
conf/tcc
Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness.
Qipeng Liu
Mark Zhandry
2016
conf/crypto
The Magic of ELFs.
Mark Zhandry
2016
conf/crypto
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13.
Eric Miles
Amit Sahai
Mark Zhandry
2016
conf/eurocrypt
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key.
Ryo Nishimaki
Daniel Wichs
Mark Zhandry
2016
conf/eurocrypt
Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits.
Saikrishna Badrinarayanan
Eric Miles
Amit Sahai
Mark Zhandry
2016
conf/asiacrypt
How to Generate and Use Universal Samplers.
Dennis Hofheinz
Tibor Jager
Dakshita Khurana
Amit Sahai
Brent Waters
Mark Zhandry
2016
conf/tcc
Functional Encryption Without Obfuscation.
Sanjam Garg
Craig Gentry
Shai Halevi
Mark Zhandry
2016
conf/tcc
Strong Hardness of Privacy from Weak Traitor Tracing.
Lucas Kowalczyk
Tal Malkin
Jonathan R. Ullman
Mark Zhandry
2016
conf/tcc
How to Avoid Obfuscation Using Witness PRFs.
Mark Zhandry
2016
conf/tcc
Secure Obfuscation in a Weak Multilinear Map Model.
Sanjam Garg
Eric Miles
Pratyay Mukherjee
Amit Sahai
Akshayaram Srinivasan
Mark Zhandry
2016
conf/tcc
Order-Revealing Encryption and the Hardness of Private Learning.
Mark Bun
Mark Zhandry
2016
conf/tcc
Cutting-Edge Cryptography Through the Lens of Secret Sharing.
Ilan Komargodski
Mark Zhandry
2015
conf/eurocrypt
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation.
Dan Boneh
Kevin Lewi
Mariana Raykova
Amit Sahai
Mark Zhandry
Joe Zimmerman
2014
conf/crypto
Low Overhead Broadcast Encryption from Multilinear Maps.
Dan Boneh
Brent Waters
Mark Zhandry
2014
conf/crypto
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation.
Dan Boneh
Mark Zhandry
2013
conf/crypto
Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World.
Dan Boneh
Mark Zhandry
2013
conf/eurocrypt
Quantum-Secure Message Authentication Codes.
Dan Boneh
Mark Zhandry
2012
conf/crypto
Secure Identity-Based Encryption in the Quantum Random Oracle Model.
Mark Zhandry
2011
conf/asiacrypt
Random Oracles in a Quantum World.
Dan Boneh
Özgür Dagdelen
Marc Fischlin
Anja Lehmann
Christian Schaffner
Mark Zhandry
Coauthors
Aayush Jain
(1)
Adam O'Neill
(1)
Akshayaram Srinivasan
(2)
Amit Sahai
(6)
Andrea Coladangelo
(1)
Anja Lehmann
(1)
Benjamin Kuykendall
(1)
Bhaskar Roberts
(1)
Brent Waters
(5)
Christian Schaffner
(1)
Cong Zhang
(4)
Craig Gentry
(1)
Dakshita Khurana
(1)
Damiano Abram
(1)
Dan Boneh
(7)
Daniel Wichs
(3)
David Cash
(1)
Dennis Hofheinz
(1)
Eli Goldin
(1)
Eric Miles
(3)
Fatih Kaleoglu
(1)
Feng-Hao Liu
(1)
Fermi Ma
(4)
George Lu
(1)
Hart Montgomery
(3)
Henry Yuen
(1)
Ilan Komargodski
(1)
James Bartusek
(3)
Jiahui Liu
(5)
Jiaxin Guan
(6)
Joe Zimmerman
(1)
Jonathan R. Ullman
(1)
Justin Raizes
(1)
Kevin Lewi
(1)
Lucas Kowalczyk
(1)
Luowen Qian
(2)
Marc Fischlin
(1)
Mariana Raykova
(1)
Mark Bun
(1)
Mark Zhandry
(74)
Omkant Pandey
(1)
Omri Shmueli
(1)
Özgür Dagdelen
(1)
Paul Lou
(1)
Prabhanjan Ananth
(1)
Pratyay Mukherjee
(1)
Qipeng Liu
(9)
Ruizhe Zhang
(1)
Ryo Nishimaki
(1)
Saachi Mutreja
(1)
Saikrishna Badrinarayanan
(1)
Sanjam Garg
(3)
Scott Aaronson
(1)
Shai Halevi
(1)
Sumegha Garg
(1)
Takashi Yamakawa
(1)
Tal Malkin
(1)
Tancrède Lepoint
(1)
Tibor Jager
(1)
Venkata Koppula
(1)
Xingjian Li
(1)
Yilei Chen
(1)
Yuval Ishai
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to