default search action
Daniel Wichs
Person information
- affiliation: Northeastern University
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
Books and Theses
- 2011
- [b1]Daniel Wichs:
Cryptographic Resilience to Continual Information Leakage. New York University, USA, 2011
Journal Articles
- 2024
- [j14]Daniel Wichs:
Technical Perspective: Hiding Secrets in Programs. Commun. ACM 67(3): 96 (2024) - [j13]Carsten Baum, Jens Berlips, Walther Chen, Ivan Bjerre Damgård, Kevin M. Esvelt, Leonard Foner, Dana Gretton, Martin Kysel, Ronald L. Rivest, Lawrence Roy, Francesca Sage-Ling, Adi Shamir, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Daniel Wichs, Stephen Wooster, Andrew C. Yao, Yu Yu:
Efficient Maliciously Secure Oblivious Exponentiations. IACR Commun. Cryptol. 1(3): 10 (2024) - 2023
- [j12]Ran Cohen, Abhi Shelat, Daniel Wichs:
Adaptively Secure MPC with Sublinear Communication Complexity. J. Cryptol. 36(2): 11 (2023) - 2021
- [j11]Mor Weiss, Daniel Wichs:
Is There an Oblivious RAM Lower Bound for Online Reads? J. Cryptol. 34(3): 18 (2021) - 2020
- [j10]Nir Bitansky, Ryo Nishimaki, Alain Passelègue, Daniel Wichs:
From Cryptomania to Obfustopia Through Secret-Key Functional Encryption. J. Cryptol. 33(2): 357-405 (2020) - 2018
- [j9]Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wichs:
Non-Malleable Codes. J. ACM 65(4): 20:1-20:32 (2018) - [j8]Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs:
Watermarking Cryptographic Capabilities. SIAM J. Comput. 47(6): 2157-2202 (2018) - 2017
- [j7]Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs:
How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs. Algorithmica 79(4): 1196-1232 (2017) - [j6]Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs:
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input. Algorithmica 79(4): 1353-1373 (2017) - [j5]David Cash, Alptekin Küpçü, Daniel Wichs:
Dynamic Proofs of Retrievability Via Oblivious RAM. J. Cryptol. 30(1): 22-57 (2017) - 2016
- [j4]Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia, Daniel Wichs:
A counterexample to the chain rule for conditional HILL entropy. Comput. Complex. 25(3): 567-605 (2016) - [j3]Carmit Hazay, Adriana López-Alt, Hoeteck Wee, Daniel Wichs:
Leakage-Resilient Cryptography from Minimal Assumptions. J. Cryptol. 29(3): 514-551 (2016) - [j2]Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs:
Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits. IEEE Trans. Inf. Theory 62(12): 7179-7194 (2016) - 2013
- [j1]Elette Boyle, Gil Segev, Daniel Wichs:
Fully Leakage-Resilient Signatures. J. Cryptol. 26(3): 513-558 (2013)
Conference and Workshop Papers
- 2024
- [c109]Alexander Bienstock, Yevgeniy Dodis, Paul Rösler, Daniel Wichs:
Interval Key-Encapsulation Mechanism. ASIACRYPT (2) 2024: 361-393 - [c108]Fangqi Dong, Zihan Hao, Ethan Mook, Hoeteck Wee, Daniel Wichs:
Laconic Function Evaluation and ABE for RAMs from (Ring-)LWE. CRYPTO (3) 2024: 107-142 - [c107]Yuval Ishai, Elaine Shi, Daniel Wichs:
PIR with Client-Side Preprocessing: Information-Theoretic Constructions and Lower Bounds. CRYPTO (9) 2024: 148-182 - [c106]Wei-Kai Lin, Ethan Mook, Daniel Wichs:
Doubly Efficient Cryptography: Commitments, Arguments and RAM MPC. CRYPTO (8) 2024: 240-273 - [c105]Fangqi Dong, Zihan Hao, Ethan Mook, Daniel Wichs:
Laconic Function Evaluation, Functional Encryption and Obfuscation for RAMs with Sublinear Computation. EUROCRYPT (2) 2024: 190-218 - [c104]Yevgeniy Dodis, Aayush Jain, Huijia Lin, Ji Luo, Daniel Wichs:
How to Simulate Random Oracles with Auxiliary Input. FOCS 2024: 1207-1230 - [c103]Brent Waters, Daniel Wichs:
Adaptively Secure Attribute-Based Encryption from Witness Encryption. TCC (3) 2024: 65-90 - 2023
- [c102]Aayush Jain, Huijia Lin, Ji Luo, Daniel Wichs:
The Pseudorandom Oracle Model and Ideal Obfuscation. CRYPTO (4) 2023: 233-262 - [c101]Brent Waters, Daniel Wichs:
Universal Amplification of KDM Security: From 1-Key Circular to Multi-Key KDM. CRYPTO (2) 2023: 674-693 - [c100]Yevgeniy Dodis, Willy Quach, Daniel Wichs:
Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited. EUROCRYPT (1) 2023: 86-116 - [c99]Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs:
A Map of Witness Maps: New Definitions and Connections. Public Key Cryptography (2) 2023: 635-662 - [c98]Wei-Kai Lin, Ethan Mook, Daniel Wichs:
Doubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation from Ring LWE. STOC 2023: 595-608 - [c97]Yael Kalai, Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs:
Boosting Batch Arguments and RAM Delegation. STOC 2023: 1545-1552 - [c96]Willy Quach, LaKyah Tyner, Daniel Wichs:
Lower Bounds on Anonymous Whistleblowing. TCC (3) 2023: 3-32 - [c95]Jiaxin Guan, Daniel Wichs, Mark Zhandry:
Multi-instance Randomness Extraction and Security Against Bounded-Storage Mass Surveillance. TCC (3) 2023: 93-122 - [c94]Yevgeniy Dodis, Shai Halevi, Daniel Wichs:
Security with Functional Re-encryption from CPA. TCC (2) 2023: 279-305 - 2022
- [c93]Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs:
Witness Encryption and Null-IO from Evasive LWE. ASIACRYPT (1) 2022: 195-221 - [c92]Saikrishna Badrinarayanan, Yuval Ishai, Dakshita Khurana, Amit Sahai, Daniel Wichs:
Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC. ITC 2022: 10:1-10:21 - [c91]Justin Holmgren, Minghao Liu, LaKyah Tyner, Daniel Wichs:
Nearly Optimal Property Preserving Hashing. CRYPTO (3) 2022: 473-502 - [c90]Jiaxin Guan, Daniel Wichs, Mark Zhandry:
Incompressible Cryptography. EUROCRYPT (1) 2022: 700-730 - [c89]Yevgeniy Dodis, Willy Quach, Daniel Wichs:
Authentication in the Bounded Storage Model. EUROCRYPT (3) 2022: 737-766 - [c88]Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs:
Small-Box Cryptography. ITCS 2022: 56:1-56:25 - [c87]Alex Lombardi, Ethan Mook, Willy Quach, Daniel Wichs:
Post-quantum Insecurity from LWE. TCC (1) 2022: 3-32 - 2021
- [c86]Willy Quach, Brent Waters, Daniel Wichs:
Targeted Lossy Functions and Applications. CRYPTO (4) 2021: 424-453 - [c85]Chethan Kamath, Karen Klein, Krzysztof Pietrzak, Daniel Wichs:
Limits on the Adaptive Security of Yao's Garbling. CRYPTO (2) 2021: 486-515 - [c84]Hoeteck Wee, Daniel Wichs:
Candidate Obfuscation via Oblivious LWE Sampling. EUROCRYPT (3) 2021: 127-156 - [c83]Yevgeniy Dodis, Harish Karthikeyan, Daniel Wichs:
Updatable Public Key Encryption in the Standard Model. TCC (3) 2021: 254-285 - [c82]Lalita Devadas, Willy Quach, Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs:
Succinct LWE Sampling, Random Polynomials, and Obfuscation. TCC (2) 2021: 256-287 - 2020
- [c81]Xin Li, Fermi Ma, Willy Quach, Daniel Wichs:
Leakage-Resilient Key Exchange and Two-Seed Extractors. CRYPTO (1) 2020: 401-429 - [c80]Tal Moran, Daniel Wichs:
Incompressible Encodings. CRYPTO (1) 2020: 494-523 - [c79]Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs:
Extracting Randomness from Extractor-Dependent Sources. EUROCRYPT (1) 2020: 313-342 - [c78]Alex Lombardi, Vinod Vaikuntanathan, Daniel Wichs:
Statistical ZAPR Arguments from Bilinear Maps. EUROCRYPT (3) 2020: 620-641 - [c77]Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny, Daniel Wichs:
Two-Round Oblivious Transfer from CDH or LPN. EUROCRYPT (2) 2020: 768-797 - [c76]Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs:
Witness Maps and Applications. Public Key Cryptography (1) 2020: 220-246 - [c75]Shweta Agrawal, Daniel Wichs, Shota Yamada:
Optimal Broadcast Encryption from LWE and Pairings in the Standard Model. TCC (1) 2020: 149-178 - 2019
- [c74]Ran Cohen, Abhi Shelat, Daniel Wichs:
Adaptively Secure MPC with Sublinear Communication Complexity. CRYPTO (2) 2019: 30-60 - [c73]Marshall Ball, Siyao Guo, Daniel Wichs:
Non-malleable Codes for Decision Trees. CRYPTO (1) 2019: 413-434 - [c72]Ariel Hamlin, Justin Holmgren, Mor Weiss, Daniel Wichs:
On the Plausibility of Fully Homomorphic Encryption for RAMs. CRYPTO (1) 2019: 589-619 - [c71]Alex Lombardi, Willy Quach, Ron D. Rothblum, Daniel Wichs, David J. Wu:
New Constructions of Reusable Designated-Verifier NIZKs. CRYPTO (3) 2019: 670-700 - [c70]Rishab Goyal, Willy Quach, Brent Waters, Daniel Wichs:
Broadcast and Trace with N^ε Ciphertext Size from Standard Assumptions. CRYPTO (3) 2019: 826-855 - [c69]Ariel Hamlin, Rafail Ostrovsky, Mor Weiss, Daniel Wichs:
Private Anonymous Data Access. EUROCRYPT (2) 2019: 244-273 - [c68]Willy Quach, Ron D. Rothblum, Daniel Wichs:
Reusable Designated-Verifier NIZKs for all NP from CDH. EUROCRYPT (2) 2019: 593-621 - [c67]Zvika Brakerski, Vadim Lyubashevsky, Vinod Vaikuntanathan, Daniel Wichs:
Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing. EUROCRYPT (3) 2019: 619-635 - [c66]Ran Canetti, Yilei Chen, Justin Holmgren, Alex Lombardi, Guy N. Rothblum, Ron D. Rothblum, Daniel Wichs:
Fiat-Shamir: from practice to theory. STOC 2019: 1082-1090 - 2018
- [c65]Lucas Kowalczyk, Tal Malkin, Jonathan R. Ullman, Daniel Wichs:
Hardness of Non-interactive Differential Privacy from One-Way Functions. CRYPTO (1) 2018: 437-466 - [c64]Willy Quach, Hoeteck Wee, Daniel Wichs:
Laconic Function Evaluation and Applications. FOCS 2018: 859-870 - [c63]Ariel Hamlin, Abhi Shelat, Mor Weiss, Daniel Wichs:
Multi-Key Searchable Encryption, Revisited. Public Key Cryptography (1) 2018: 95-124 - [c62]Zvika Brakerski, Aayush Jain, Ilan Komargodski, Alain Passelègue, Daniel Wichs:
Non-trivial Witness Encryption and Null-iO from Standard Assumptions. SCN 2018: 425-441 - [c61]Saikrishna Badrinarayanan, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai, Daniel Wichs:
Succinct delegation for low-space non-deterministic computation. STOC 2018: 709-721 - [c60]Yilei Chen, Vinod Vaikuntanathan, Brent Waters, Hoeteck Wee, Daniel Wichs:
Traitor-Tracing from LWE Made Simple and Attribute-Based. TCC (2) 2018: 341-369 - [c59]Mor Weiss, Daniel Wichs:
Is There an Oblivious RAM Lower Bound for Online Reads? TCC (2) 2018: 603-635 - [c58]Willy Quach, Daniel Wichs, Giorgos Zirdelis:
Watermarking PRFs Under Standard Assumptions: Public Marking and Security with Extraction Queries. TCC (2) 2018: 669-698 - 2017
- [c57]Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak, Daniel Wichs:
Be Adaptive, Avoid Overcommitting. CRYPTO (1) 2017: 133-163 - [c56]Daniel Wichs, Giorgos Zirdelis:
Obfuscating Compute-and-Compare Programs under LWE. FOCS 2017: 600-611 - [c55]Zahra Jafargholi, Alessandra Scafuro, Daniel Wichs:
Adaptively Indistinguishable Garbled Circuits. TCC (2) 2017: 40-71 - [c54]Shafi Goldwasser, Saleet Klein, Daniel Wichs:
The Edited Truth. TCC (1) 2017: 305-340 - 2016
- [c53]Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum, Daniel Wichs:
Spooky Encryption and Its Applications. CRYPTO (3) 2016: 93-122 - [c52]Brett Hemenway, Zahra Jafargholi, Rafail Ostrovsky, Alessandra Scafuro, Daniel Wichs:
Adaptively Secure Garbled Circuits from One-Way Functions. CRYPTO (3) 2016: 149-178 - [c51]Allison Bishop, Valerio Pastro, Rajmohan Rajaraman, Daniel Wichs:
Essentially Optimal Robust Secret Sharing with Maximal Corruptions. EUROCRYPT (1) 2016: 58-86 - [c50]Ryo Nishimaki, Daniel Wichs, Mark Zhandry:
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key. EUROCRYPT (2) 2016: 388-419 - [c49]Pratyay Mukherjee, Daniel Wichs:
Two Round Multiparty Computation via Multi-key FHE. EUROCRYPT (2) 2016: 735-763 - [c48]Zvika Brakerski, Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs:
Obfuscating Conjunctions under Entropic Ring LWE. ITCS 2016: 147-156 - [c47]Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs:
Watermarking cryptographic capabilities. STOC 2016: 1115-1127 - [c46]Dennis Hofheinz, Vanishree Rao, Daniel Wichs:
Standard Security Does Not Imply Indistinguishability Under Selective Opening. TCC (B2) 2016: 121-145 - [c45]Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren, Elaine Shi, Daniel Wichs:
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM. TCC (A2) 2016: 145-174 - [c44]Nir Bitansky, Ryo Nishimaki, Alain Passelègue, Daniel Wichs:
From Cryptomania to Obfustopia Through Secret-Key Functional Encryption. TCC (B2) 2016: 391-418 - [c43]Zahra Jafargholi, Daniel Wichs:
Adaptive Security of Yao's Garbled Circuits. TCC (B1) 2016: 433-458 - [c42]Nir Bitansky, Omer Paneth, Daniel Wichs:
Perfect Structure on the Edge of Chaos - Trapdoor Permutations from Indistinguishability Obfuscation. TCC (A1) 2016: 474-502 - 2015
- [c41]Tatsuaki Okamoto, Krzysztof Pietrzak, Brent Waters, Daniel Wichs:
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators. ASIACRYPT (1) 2015: 121-145 - [c40]Pavel Hubácek, Daniel Wichs:
On the Communication Complexity of Secure Function Evaluation with Long Output. ITCS 2015: 163-172 - [c39]Vadim Lyubashevsky, Daniel Wichs:
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions. Public Key Cryptography 2015: 716-730 - [c38]Sergey Gorbunov, Vinod Vaikuntanathan, Daniel Wichs:
Leveled Fully Homomorphic Signatures from Standard Lattices. STOC 2015: 469-477 - [c37]Zahra Jafargholi, Daniel Wichs:
Tamper Detection and Continuous Non-malleable Codes. TCC (1) 2015: 451-480 - 2014
- [c36]Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz, Daniel Wichs:
How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs. CRYPTO (2) 2014: 37-54 - [c35]Sanjam Garg, Craig Gentry, Shai Halevi, Daniel Wichs:
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input. CRYPTO (1) 2014: 518-535 - [c34]Yevgeniy Dodis, Krzysztof Pietrzak, Daniel Wichs:
Key Derivation without Entropy Waste. EUROCRYPT 2014: 93-110 - [c33]Sebastian Faust, Pratyay Mukherjee, Daniele Venturi, Daniel Wichs:
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits. EUROCRYPT 2014: 111-128 - [c32]Craig Gentry, Shai Halevi, Steve Lu, Rafail Ostrovsky, Mariana Raykova, Daniel Wichs:
Garbled RAM Revisited. EUROCRYPT 2014: 405-422 - [c31]Craig Gentry, Shai Halevi, Mariana Raykova, Daniel Wichs:
Outsourcing Private RAM Computation. FOCS 2014: 404-413 - 2013
- [c30]Rosario Gennaro, Daniel Wichs:
Fully Homomorphic Message Authenticators. ASIACRYPT (2) 2013: 301-320 - [c29]Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan, Daniel Wichs:
On Continual Leakage of Discrete Log Representations. ASIACRYPT (2) 2013: 401-420 - [c28]Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, Daniel Wichs:
Security analysis of pseudo-random number generators with input: /dev/random is not robust. CCS 2013: 647-658 - [c27]Joël Alwen, Stephan Krenn, Krzysztof Pietrzak, Daniel Wichs:
Learning with Rounding, Revisited - New Reduction, Properties and Applications. CRYPTO (1) 2013: 57-74 - [c26]Carmit Hazay, Adriana López-Alt, Hoeteck Wee, Daniel Wichs:
Leakage-Resilient Cryptography from Minimal Assumptions. EUROCRYPT 2013: 160-176 - [c25]David Cash, Alptekin Küpçü, Daniel Wichs:
Dynamic Proofs of Retrievability via Oblivious RAM. EUROCRYPT 2013: 279-295 - [c24]Daniel Wichs:
Barriers in cryptography with weak, correlated and leaky sources. ITCS 2013: 111-126 - [c23]Craig Gentry, Kenny A. Goldman, Shai Halevi, Charanjit S. Jutla, Mariana Raykova, Daniel Wichs:
Optimizing ORAM and Using It Efficiently for Secure Computation. Privacy Enhancing Technologies 2013: 1-18 - [c22]Nir Bitansky, Dana Dachman-Soled, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai, Adriana López-Alt, Daniel Wichs:
Why "Fiat-Shamir for Proofs" Lacks a Proof. TCC 2013: 182-201 - 2012
- [c21]Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs:
Message Authentication, Revisited. EUROCRYPT 2012: 355-374 - [c20]Gilad Asharov, Abhishek Jain, Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan, Daniel Wichs:
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE. EUROCRYPT 2012: 483-501 - [c19]Yevgeniy Dodis, Abhishek Jain, Tal Moran, Daniel Wichs:
Counterexamples to Hardness Amplification beyond Negligible. TCC 2012: 476-493 - 2011
- [c18]Stefan Dziembowski, Tomasz Kazana, Daniel Wichs:
Key-Evolution Schemes Resilient to Space-Bounded Leakage. CRYPTO 2011: 335-353 - [c17]Elette Boyle, Gil Segev, Daniel Wichs:
Fully Leakage-Resilient Signatures. EUROCRYPT 2011: 89-108 - [c16]Yevgeniy Dodis, Allison B. Lewko, Brent Waters, Daniel Wichs:
Storing Secrets on Continually Leaky Devices. FOCS 2011: 688-697 - [c15]Craig Gentry, Daniel Wichs:
Separating succinct non-interactive arguments from all falsifiable assumptions. STOC 2011: 99-108 - [c14]Stefan Dziembowski, Tomasz Kazana, Daniel Wichs:
One-Time Computable Self-erasing Functions. TCC 2011: 125-143 - 2010
- [c13]Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs:
Efficient Public-Key Cryptography in the Presence of Key Leakage. ASIACRYPT 2010: 613-631 - [c12]Joël Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish, Daniel Wichs:
Public-Key Encryption in the Bounded-Retrieval Model. EUROCRYPT 2010: 113-134 - [c11]Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt, Daniel Wichs:
Cryptography against Continuous Memory Attacks. FOCS 2010: 511-520 - [c10]Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wichs:
Non-Malleable Codes. ICS 2010: 434-452 - [c9]Ran Canetti, Yael Tauman Kalai, Mayank Varia, Daniel Wichs:
On Symmetric Encryption and Point Obfuscation. TCC 2010: 52-71 - 2009
- [c8]Joël Alwen, Yevgeniy Dodis, Daniel Wichs:
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model. CRYPTO 2009: 36-54 - [c7]Juan A. Garay, Daniel Wichs, Hong-Sheng Zhou:
Somewhat Non-committing Encryption and Efficient Adaptively Secure Oblivious Transfer. CRYPTO 2009: 505-523 - [c6]