Divesh Aggarwal
Orcid: 0000-0002-3841-0262
According to our database1,
Divesh Aggarwal
authored at least 67 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Trans. Inf. Theory, January, 2024
Electron. Colloquium Comput. Complex., 2024
Electron. Colloquium Comput. Complex., 2024
Polynomial Time Algorithms for Integer Programming and Unbounded Subset Sum in the Total Regime.
CoRR, 2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
2023
CoRR, 2023
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the 64th IEEE Annual Symposium on Foundations of Computer Science, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Privacy Amplification With Tamperable Memory via Non-Malleable Two-Source Extractors.
IEEE Trans. Inf. Theory, 2022
IACR Cryptol. ePrint Arch., 2022
Why we couldn't prove SETH hardness of the Closest Vector Problem for even norms, and of the Subset Sum Problem!
CoRR, 2022
2021
Inf. Process. Lett., 2021
Electron. Colloquium Comput. Complex., 2021
Simplicity Meets Near-Optimal Rate: Non-malleable Codes and Non-malleable Two-source Extractors via Rate Boosters.
Electron. Colloquium Comput. Complex., 2021
Electron. Colloquium Comput. Complex., 2021
Improved (Provable) Algorithms for the Shortest Vector Problem via Bounded Distance Decoding.
Proceedings of the 38th International Symposium on Theoretical Aspects of Computer Science, 2021
Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, 2021
Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, 2021
A 2<sup>n/2</sup>-Time Algorithm for $\sqrt{n}$-SVP and $\sqrt{n}$-Hermite SVP, and an Improved Time-Approximation Tradeoff for (H)SVP.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
2020
Two-Source Non-Malleable Extractors and Applications to Privacy Amplification with Tamperable Memory.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
A 2<sup>n/2</sup>-Time Algorithm for √n-SVP and √n-Hermite SVP, and an Improved Time-Approximation Tradeoff for (H)SVP.
CoRR, 2020
A Note on the Concrete Hardness of the Shortest Independent Vectors Problem in Lattices.
CoRR, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
A Quantum-Proof Non-Malleable Extractor With Application to Privacy Amplification against Active Quantum Adversaries.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Stronger Leakage-Resilient and Non-Malleable Secret-Sharing Schemes for General Access Structures.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, 2018
Just Take the Average! An Embarrassingly Simple 2^n-Time Algorithm for SVP (and CVP).
Proceedings of the 1st Symposium on Simplicity in Algorithms, 2018
Improved Algorithms for the Shortest Vector Problem and the Closest Vector Problem in the Infinity Norm.
Proceedings of the 29th International Symposium on Algorithms and Computation, 2018
2017
2016
Inf. Process. Lett., 2016
Revisiting the Sanders-Freiman-Ruzsa Theorem in $\mathbb{F}_p^n$ and its Application to Non-malleable Codes.
CoRR, 2016
Chic. J. Theor. Comput. Sci., 2016
Revisiting the Sanders-Bogolyubov-Ruzsa theorem in Fp<sup>n</sup> and its application to non-malleable codes.
Proceedings of the IEEE International Symposium on Information Theory, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Affine-malleable Extractors, Spectrum Doubling, and Application to Privacy Amplification.
Electron. Colloquium Comput. Complex., 2015
Solving the Shortest Vector Problem in 2<sup>n</sup> Time Using Discrete Gaussian Sampling: Extended Abstract.
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015
Solving the Closest Vector Problem in 2^n Time - The Discrete Gaussian Strikes Again!
Proceedings of the IEEE 56th Annual Symposium on Foundations of Computer Science, 2015
2014
Electron. Colloquium Comput. Complex., 2014
CoRR, 2014
2013
2011
The Leakage-Resilience Limit of a Computational Problem Is Equal to Its Unpredictability Entropy.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2006
Proceedings of the Algorithms and Computation, 17th International Symposium, 2006
2005
Proceedings of the Graph-Theoretic Concepts in Computer Science, 2005