Craig Gentry
Affiliations:- IBM Thomas J. Watson Research Center, Yorktown Heights, NY, USA
According to our database1,
Craig Gentry
authored at least 106 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
STOP-HCV-HCC Program: Privacy-Preserving Innovation for Remote Data Access Analytics at Federally Qualified Health Centers in South Texas.
Proceedings of the Digital Health and Informatics Innovations for Sustainable Health Care Systems, 2024
2022
IACR Cryptol. ePrint Arch., 2022
2021
Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
2019
Proc. Priv. Enhancing Technol., 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2017
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input.
Algorithmica, 2017
2016
Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits.
SIAM J. Comput., 2016
IACR Cryptol. ePrint Arch., 2016
Commun. ACM, 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
2015
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs.
J. Cryptol., 2015
IACR Cryptol. ePrint Arch., 2015
2014
ACM Trans. Comput. Theory, 2014
IACR Cryptol. ePrint Arch., 2014
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits.
IACR Cryptol. ePrint Arch., 2014
Electron. Colloquium Comput. Complex., 2014
Noncommutative Determinant is Hard: A Simple Proof Using an Extension of Barrington's Theorem.
Electron. Colloquium Comput. Complex., 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
2013
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
2011
IACR Cryptol. ePrint Arch., 2011
IACR Cryptol. ePrint Arch., 2011
Electron. Colloquium Comput. Complex., 2011
2010
The Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise Appearance.
Proceedings of the LLL Algorithm - Survey and Applications, 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Advances in Cryptology, 2010
Proceedings of the Advances in Cryptology, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
ACM Trans. Inf. Syst. Secur., 2008
IACR Cryptol. ePrint Arch., 2008
2007
IACR Cryptol. ePrint Arch., 2007
Ordered Multisignatures and Identity-Based Sequential Aggregate Signatures, with Applications to Secure Routing.
IACR Cryptol. ePrint Arch., 2007
Electron. Colloquium Comput. Complex., 2007
2006
Proceedings of the Public Key Cryptography, 2006
IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures.
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2006), 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
Proceedings of the Advances in Cryptology, 2006
2005
End-to-end security in the presence of intelligent data adapting proxies: the case of authenticating transcoded streaming media.
IEEE J. Sel. Areas Commun., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs.
Proceedings of the Advances in Cryptology, 2005
2004
Wirel. Pers. Commun., 2004
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Financial Cryptography, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Communications and Multimedia Security, 2004
Proceedings of the Advances in Cryptology, 2004
2003
IACR Cryptol. ePrint Arch., 2003
2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001