default search action
BibTeX records: Eric Miles
@article{DBLP:journals/iandc/JahanjouMV18, author = {Hamidreza Jahanjou and Eric Miles and Emanuele Viola}, title = {Local reduction}, journal = {Inf. Comput.}, volume = {261}, pages = {281--295}, year = {2018}, url = {https://doi.org/10.1016/j.ic.2018.02.009}, doi = {10.1016/J.IC.2018.02.009}, timestamp = {Tue, 03 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iandc/JahanjouMV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MilesSZ16, author = {Eric Miles and Amit Sahai and Mark Zhandry}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over {GGH13}}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {629--658}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_22}, doi = {10.1007/978-3-662-53008-5\_22}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MilesSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BadrinarayananM16, author = {Saikrishna Badrinarayanan and Eric Miles and Amit Sahai and Mark Zhandry}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {764--791}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_27}, doi = {10.1007/978-3-662-49896-5\_27}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BadrinarayananM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GargMMSSZ16, author = {Sanjam Garg and Eric Miles and Pratyay Mukherjee and Amit Sahai and Akshayaram Srinivasan and Mark Zhandry}, editor = {Martin Hirt and Adam D. Smith}, title = {Secure Obfuscation in a Weak Multilinear Map Model}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {241--268}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_10}, doi = {10.1007/978-3-662-53644-5\_10}, timestamp = {Tue, 20 Aug 2024 08:48:08 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GargMMSSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MilesSZ16, author = {Eric Miles and Amit Sahai and Mark Zhandry}, title = {Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over {GGH13}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {147}, year = {2016}, url = {http://eprint.iacr.org/2016/147}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MilesSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MilesV16, author = {Eric Miles and Emanuele Viola}, title = {On the complexity of constructing pseudorandom functions (especially when they don't exist)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {343}, year = {2016}, url = {http://eprint.iacr.org/2016/343}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MilesV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MilesSZ16a, author = {Eric Miles and Amit Sahai and Mark Zhandry}, title = {Secure obfuscation in a weak multilinear map model: {A} simple construction secure against all known attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {588}, year = {2016}, url = {http://eprint.iacr.org/2016/588}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MilesSZ16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargMMSSZ16, author = {Sanjam Garg and Eric Miles and Pratyay Mukherjee and Amit Sahai and Akshayaram Srinivasan and Mark Zhandry}, title = {Secure Obfuscation in a Weak Multilinear Map Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {817}, year = {2016}, url = {http://eprint.iacr.org/2016/817}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargMMSSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/MilesV15, author = {Eric Miles and Emanuele Viola}, title = {Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs}, journal = {J. {ACM}}, volume = {62}, number = {6}, pages = {46:1--46:29}, year = {2015}, url = {https://doi.org/10.1145/2792978}, doi = {10.1145/2792978}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jacm/MilesV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/MilesV15, author = {Eric Miles and Emanuele Viola}, title = {On the Complexity of Constructing Pseudorandom Functions (Especially when They Don't Exist)}, journal = {J. Cryptol.}, volume = {28}, number = {3}, pages = {509--532}, year = {2015}, url = {https://doi.org/10.1007/s00145-013-9161-x}, doi = {10.1007/S00145-013-9161-X}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/MilesV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/CoronGHLMM0ST15, author = {Jean{-}S{\'{e}}bastien Coron and Craig Gentry and Shai Halevi and Tancr{\`{e}}de Lepoint and Hemanta K. Maji and Eric Miles and Mariana Raykova and Amit Sahai and Mehdi Tibouchi}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Zeroizing Without Low-Level Zeroes: New {MMAP} Attacks and their Limitations}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {247--266}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_12}, doi = {10.1007/978-3-662-47989-6\_12}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/CoronGHLMM0ST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/JahanjouMV15, author = {Hamid Jahanjou and Eric Miles and Emanuele Viola}, editor = {Magn{\'{u}}s M. Halld{\'{o}}rsson and Kazuo Iwama and Naoki Kobayashi and Bettina Speckmann}, title = {Local Reductions}, booktitle = {Automata, Languages, and Programming - 42nd International Colloquium, {ICALP} 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9134}, pages = {749--760}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47672-7\_61}, doi = {10.1007/978-3-662-47672-7\_61}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/JahanjouMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananM15, author = {Saikrishna Badrinarayanan and Eric Miles and Amit Sahai and Mark Zhandry}, title = {Post-Zeroizing Obfuscation: The case of Evasive Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {167}, year = {2015}, url = {http://eprint.iacr.org/2015/167}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CoronGHLMM0ST15, author = {Jean{-}S{\'{e}}bastien Coron and Craig Gentry and Shai Halevi and Tancr{\`{e}}de Lepoint and Hemanta K. Maji and Eric Miles and Mariana Raykova and Amit Sahai and Mehdi Tibouchi}, title = {Zeroizing Without Low-Level Zeroes: New {MMAP} Attacks and Their Limitations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {596}, year = {2015}, url = {http://eprint.iacr.org/2015/596}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CoronGHLMM0ST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AggarwalDJMR14, author = {Divesh Aggarwal and Yevgeniy Dodis and Zahra Jafargholi and Eric Miles and Leonid Reyzin}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Amplifying Privacy in Privacy Amplification}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {183--198}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_11}, doi = {10.1007/978-3-662-44381-1\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AggarwalDJMR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/innovations/Miles14, author = {Eric Miles}, editor = {Moni Naor}, title = {Iterated group products and leakage resilience against {NC1}}, booktitle = {Innovations in Theoretical Computer Science, ITCS'14, Princeton, NJ, USA, January 12-14, 2014}, pages = {261--268}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2554797.2554822}, doi = {10.1145/2554797.2554822}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/innovations/Miles14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/JahanjouMV14, author = {Hamidreza Jahanjou and Eric Miles and Emanuele Viola}, title = {Succinct and explicit circuits for sorting and connectivity}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR14-037}}, year = {2014}, url = {https://eccc.weizmann.ac.il/report/2014/037}, eprinttype = {ECCC}, eprint = {TR14-037}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/JahanjouMV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MilesSW14, author = {Eric Miles and Amit Sahai and Mor Weiss}, title = {Protecting obfuscation against arithmetic attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {878}, year = {2014}, url = {http://eprint.iacr.org/2014/878}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MilesSW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/MilesV13, author = {Eric Miles and Emanuele Viola}, editor = {Dan Boneh and Tim Roughgarden and Joan Feigenbaum}, title = {Shielding circuits with groups}, booktitle = {Symposium on Theory of Computing Conference, STOC'13, Palo Alto, CA, USA, June 1-4, 2013}, pages = {251--260}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2488608.2488640}, doi = {10.1145/2488608.2488640}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/MilesV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JahanjouMV13, author = {Hamidreza Jahanjou and Eric Miles and Emanuele Viola}, title = {Local reductions}, journal = {CoRR}, volume = {abs/1311.3171}, year = {2013}, url = {http://arxiv.org/abs/1311.3171}, eprinttype = {arXiv}, eprint = {1311.3171}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JahanjouMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Miles13, author = {Eric Miles}, title = {Iterated group products and leakage resilience against NC{\^{}}1}, journal = {CoRR}, volume = {abs/1312.3193}, year = {2013}, url = {http://arxiv.org/abs/1312.3193}, eprinttype = {arXiv}, eprint = {1312.3193}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Miles13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/JahanjouMV13, author = {Hamidreza Jahanjou and Eric Miles and Emanuele Viola}, title = {Local reductions}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR13-099}}, year = {2013}, url = {https://eccc.weizmann.ac.il/report/2013/099}, eprinttype = {ECCC}, eprint = {TR13-099}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/JahanjouMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/MilesV13, author = {Eric Miles and Emanuele Viola}, title = {Shielding circuits with groups}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR13-003}}, year = {2013}, url = {https://eccc.weizmann.ac.il/report/2013/003}, eprinttype = {ECCC}, eprint = {TR13-003}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/MilesV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MilesV13, author = {Eric Miles and Emanuele Viola}, title = {Shielding circuits with groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {2013}, url = {http://eprint.iacr.org/2013/001}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MilesV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalDJMR13, author = {Divesh Aggarwal and Yevgeniy Dodis and Zahra Jafargholi and Eric Miles and Leonid Reyzin}, title = {Amplifying Privacy in Privacy Amplification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {723}, year = {2013}, url = {http://eprint.iacr.org/2013/723}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalDJMR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Miles13, author = {Eric Miles}, title = {Iterated group products and leakage resilience against NC\({}^{\mbox{1}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {815}, year = {2013}, url = {http://eprint.iacr.org/2013/815}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Miles13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MilesV12, author = {Eric Miles and Emanuele Viola}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Substitution-Permutation Networks, Pseudorandom Functions, and Natural Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {68--85}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_5}, doi = {10.1007/978-3-642-32009-5\_5}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MilesV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/JafargholiJMRV12, author = {Zahra Jafargholi and Hamidreza Jahanjou and Eric Miles and Jaideep Ramachandran and Emanuele Viola}, title = {From {RAM} to {SAT}}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR12-125}}, year = {2012}, url = {https://eccc.weizmann.ac.il/report/2012/125}, eprinttype = {ECCC}, eprint = {TR12-125}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/JafargholiJMRV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/MilesV12, author = {Eric Miles and Emanuele Viola}, title = {On the complexity of constructing pseudorandom functions (especially when they don't exist)}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR12-019}}, year = {2012}, url = {https://eccc.weizmann.ac.il/report/2012/019}, eprinttype = {ECCC}, eprint = {TR12-019}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/MilesV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/MilesV11, author = {Eric Miles and Emanuele Viola}, editor = {Yuval Ishai}, title = {On the Complexity of Non-adaptively Increasing the Stretch of Pseudorandom Generators}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {522--539}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_31}, doi = {10.1007/978-3-642-19571-6\_31}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/MilesV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/MilesV11, author = {Eric Miles and Emanuele Viola}, title = {The Advanced Encryption Standard, Candidate Pseudorandom Functions, and Natural Proofs}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR11-076}}, year = {2011}, url = {https://eccc.weizmann.ac.il/report/2011/076}, eprinttype = {ECCC}, eprint = {TR11-076}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/MilesV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MilesV11, author = {Eric Miles and Emanuele Viola}, title = {The Advanced Encryption Standard, Candidate Pseudorandom Functions, and Natural Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {226}, year = {2011}, url = {http://eprint.iacr.org/2011/226}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MilesV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0801-1307, author = {Chris Pollett and Eric Miles}, title = {Alternating Hierarchies for Time-Space Tradeoffs}, journal = {CoRR}, volume = {abs/0801.1307}, year = {2008}, url = {http://arxiv.org/abs/0801.1307}, eprinttype = {arXiv}, eprint = {0801.1307}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0801-1307.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.