Obserwuj
Daniel Apon
Daniel Apon
Zweryfikowany adres z cs.umd.edu
Tytuł
Cytowane przez
Cytowane przez
Rok
Status report on the second round of the NIST post-quantum cryptography standardization process
G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, J Kelsey, YK Liu, ...
US Department of Commerce, NIST, 2020
2192020
Status report on the first round of the NIST post-quantum cryptography standardization process
G Alagic, G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, YK Liu, ...
US Department of Commerce, National Institute of Standards and Technology, 2019
1742019
POPE: Partial order preserving encoding
DS Roche, D Apon, SG Choi, A Yerukhimovich
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
812016
Verifiable oblivious storage
D Apon, J Katz, E Shi, A Thiruvengadam
International Workshop on Public Key Cryptography, 131-148, 2014
792014
Implementing cryptographic program obfuscation
D Apon, Y Huang, J Katz, AJ Malozemoff
Cryptology ePrint Archive, 2014
572014
Cryptanalysis of indistinguishability obfuscations of circuits over GGH13
D Apon, N Döttling, S Garg, P Mukherjee
Cryptology ePrint Archive, 2016
552016
Status report on the second round of the NIST post-quantum cryptography standardization process
D Moody, G Alagic, DC Apon, DA Cooper, QH Dang, JM Kelsey, YK Liu, ...
492020
Efficient, reusable fuzzy extractors from LWE
D Apon, C Cho, K Eldefrawy, J Katz
International Conference on Cyber Security Cryptography and Machine Learning …, 2017
472017
5gen: A framework for prototyping applications using multilinear maps and matrix branching programs
K Lewi, AJ Malozemoff, D Apon, B Carmer, A Foltzer, D Wagner, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
352016
Dimension-preserving reductions from LWE to LWR
J Alperin-Sheriff, D Apon
Cryptology ePrint Archive, 2016
342016
Recommendation for stateful hash-based signature schemes
DA Cooper, DC Apon, QH Dang, MS Davidson, MJ Dworkin, CA Miller
NIST Special Publication 800, 208, 2020
332020
Cryptanalysis of ledacrypt
D Apon, R Perlner, A Robinson, P Santini
Annual International Cryptology Conference, 389-418, 2020
202020
Constant-round group key exchange from the ring-LWE assumption
D Apon, D Dachman-Soled, H Gong, J Katz
International Conference on Post-Quantum Cryptography, 189-205, 2019
182019
Compact identity based encryption from LWE
D Apon, X Fan, FH Liu
Cryptology ePrint Archive, 2016
172016
Fully-Secure Lattice-Based IBE as Compact as PKE.
D Apon, X Fan, FH Liu
IACR Cryptol. ePrint Arch. 2016, 125, 2016
162016
Deniable attribute based encryption for branching programs from LWE
D Apon, X Fan, FH Liu
Theory of Cryptography Conference, 299-329, 2016
152016
Nistir 8240-status report on the first round of the nist post-quantum cryptography standardization process
G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, YK Liu, C Miller, ...
National Institute of Standards and Technology (NIST), 2019
142019
Status Report on the Second Round of the NIST, Post-Quantum Cryptography Standardization Process (2020)
G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, J Kelsey, YK Liu, ...
NIST IR 8309, 0
12
Nistir 8309 status report on the second round of the nist post-quantum cryptography standardization process
G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, Y Liu, C Miller, ...
National Institute of Standards and Technology (NIST), US Department of Commerce, 2020
112020
Vector encoding over lattices and its applications
D Apon, X Fan, FH Liu
Cryptology ePrint Archive, 2017
112017
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20