[go: up one dir, main page]

Follow
Sanjam Garg
Title
Cited by
Cited by
Year
Candidate indistinguishability obfuscation and functional encryption for all circuits
S Garg, C Gentry, S Halevi, M Raykova, A Sahai, B Waters
SIAM Journal on Computing 45 (3), 882-929, 2016
17892016
Candidate multilinear maps from ideal lattices
S Garg, C Gentry, S Halevi
Annual international conference on the theory and applications of …, 2013
9682013
Witness encryption and its applications
S Garg, C Gentry, A Sahai, B Waters
Proceedings of the forty-fifth annual ACM symposium on Theory of computing …, 2013
4582013
Attribute-Based Encryption for Circuits from Multilinear Maps.
S Garg, C Gentry, S Halevi, A Sahai, B Waters
Advances in Cryptology–CRYPTO 2013 2013, 2013
3842013
Protecting obfuscation against algebraic attacks
B Barak, S Garg, YT Kalai, O Paneth, A Sahai
Annual International Conference on the Theory and Applications of …, 2014
3052014
TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption
S Garg, P Mohassel, C Papamanthou
Annual International Cryptology Conference, 563-592, 2016
2492016
Identity-based encryption from the Diffie-Hellman assumption
N Döttling, S Garg
Journal of the ACM (JACM) 68 (3), 1-46, 2021
239*2021
Two-round secure MPC from indistinguishability obfuscation
S Garg, C Gentry, S Halevi, M Raykova
Theory of Cryptography Conference, 74-94, 2014
2232014
Two-round multiparty secure computation from minimal assumptions
S Garg, A Srinivasan
Journal of the ACM 69 (5), 1-30, 2022
1842022
Differing-inputs obfuscation and applications
P Ananth, D Boneh, S Garg, A Sahai, M Zhandry
Cryptology ePrint Archive, 2013
1792013
Succinct randomized encodings and their applications
N Bitansky, S Garg, H Lin, R Pass, S Telang
Proceedings of the forty-seventh annual ACM symposium on Theory of Computing …, 2015
1722015
Trapdoor hash functions and their applications
N Döttling, S Garg, Y Ishai, G Malavolta, T Mour, R Ostrovsky
Annual International Cryptology Conference, 3-32, 2019
1662019
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input.
S Garg, C Gentry, S Halevi, D Wichs
Advances in Cryptology – CRYPTO 2014, 518-535, 2013
156*2013
Leveraging linear decryption: Rate-1 fully-homomorphic encryption and time-lock puzzles
Z Brakerski, N Döttling, S Garg, G Malavolta
Theory of Cryptography Conference, 407-437, 2019
1412019
Registration-based encryption: removing private-key generator from IBE
S Garg, M Hajiabadi, M Mahmoody, A Rahimi
Theory of Cryptography Conference, 689-718, 2018
1322018
Functional encryption without obfuscation
S Garg, C Gentry, S Halevi, M Zhandry
Theory of cryptography conference, 480-511, 2015
1322015
Revisiting the cryptographic hardness of finding a nash equilibrium
S Garg, O Pandey, A Srinivasan
Annual International Cryptology Conference, 579-604, 2016
1272016
Formalizing data deletion in the context of the right to be forgotten
S Garg, S Goldwasser, PN Vasudevan
Annual International Conference on the Theory and Applications of …, 2020
1252020
Building efficient fully collusion-resilient traitor tracing and revocation schemes
S Garg, A Kumarasubramanian, A Sahai, B Waters
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1232010
Laconic oblivious transfer and its applications
C Cho, N Döttling, S Garg, D Gupta, P Miao, A Polychroniadou
Annual International Cryptology Conference, 33-65, 2017
1172017
The system can't perform the operation now. Try again later.
Articles 1–20