| Status report on the third round of the NIST post-quantum cryptography standardization process G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang, J Kelsey, ... US Department of Commerce, National Institute of Standards and Technology 4 …, 2022 | 1093 | 2022 |
| Status report on the second round of the NIST post-quantum cryptography standardization process G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, J Kelsey, YK Liu, ... US Department of Commerce, NIST 2, 69, 2020 | 548 | 2020 |
| Recommendation for stateful hash-based signature schemes DA Cooper, DC Apon, QH Dang, MS Davidson, MJ Dworkin, CA Miller NIST Special Publication 800 (208), 800-208, 2020 | 155 | 2020 |
| Status report on the second round of the NIST post-quantum cryptography standardization process D Moody, G Alagic, DC Apon, DA Cooper, QH Dang, JM Kelsey, YK Liu, ... Dustin Moody, Gorjan Alagic, Daniel C. Apon, David A. Cooper, Quynh H. Dang …, 2020 | 118 | 2020 |
| POPE: Partial order preserving encoding DS Roche, D Apon, SG Choi, A Yerukhimovich Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 106 | 2016 |
| Verifiable oblivious storage D Apon, J Katz, E Shi, A Thiruvengadam International Workshop on Public Key Cryptography, 131-148, 2014 | 90 | 2014 |
| Efficient, reusable fuzzy extractors from LWE D Apon, C Cho, K Eldefrawy, J Katz International Conference on Cyber Security Cryptography and Machine Learning …, 2017 | 81 | 2017 |
| When frodo flips: End-to-end key recovery on frodokem via rowhammer M Fahr Jr, H Kippen, A Kwong, T Dang, J Lichtinger, D Dachman-Soled, ... Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 75 | 2022 |
| Implementing cryptographic program obfuscation D Apon, Y Huang, J Katz, AJ Malozemoff Cryptology ePrint Archive, 2014 | 62 | 2014 |
| Status report on the first round of the nist post-quantum cryptography standardization process D Moody, G Alagic, JM Alperin-Sheriff, DC Apon, DA Cooper, QH Dang, ... Technical report, National Institute of Standards and Technology, 2019 | 60 | 2019 |
| Cryptanalysis of indistinguishability obfuscations of circuits over GGH13 D Apon, N Döttling, S Garg, P Mukherjee Cryptology ePrint Archive, 2016 | 59 | 2016 |
| Dimension-preserving reductions from LWE to LWR J Alperin-Sheriff, D Apon Cryptology ePrint Archive, 2016 | 58 | 2016 |
| Status report on the third round of the NIST Post-Quantum Cryptography Standardization Process (2022) G Alagic, D Apon, D Cooper, Q Dang, T Dang, J Kelsey, J Lichtinger, ... URL: https://csrc. nist. gov/publications/detail/nistir/8413/final, 2023 | 47 | 2023 |
| 5gen: A framework for prototyping applications using multilinear maps and matrix branching programs K Lewi, AJ Malozemoff, D Apon, B Carmer, A Foltzer, D Wagner, ... Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 44 | 2016 |
| Cryptanalysis of ledacrypt D Apon, R Perlner, A Robinson, P Santini Annual International Cryptology Conference, 389-418, 2020 | 39 | 2020 |
| Constant-round group key exchange from the ring-LWE assumption D Apon, D Dachman-Soled, H Gong, J Katz International Conference on Post-Quantum Cryptography, 189-205, 2019 | 39 | 2019 |
| SoK: How (not) to design and implement post-quantum cryptography J Howe, T Prest, D Apon Cryptographers’ Track at the RSA Conference, 444-477, 2021 | 34 | 2021 |
| Deniable attribute based encryption for branching programs from LWE D Apon, X Fan, FH Liu Theory of Cryptography Conference, 299-329, 2016 | 25 | 2016 |
| Compact identity based encryption from LWE D Apon, X Fan, FH Liu Cryptology ePrint Archive, 2016 | 20 | 2016 |
| Fully-Secure Lattice-Based IBE as Compact as PKE. D Apon, X Fan, FH Liu IACR Cryptol. ePrint Arch. 2016, 125, 2016 | 17 | 2016 |