Follow
Willy Quach
Willy Quach
CISPA Helmholtz Center for Information Security
Verified email at cispa.de - Homepage
Title
Cited by
Cited by
Year
Laconic function evaluation and applications
W Quach, H Wee, D Wichs
2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS …, 2018
712018
Hash proof systems over lattices revisited
F Benhamouda, O Blazy, L Ducas, W Quach
IACR International Workshop on Public Key Cryptography, 644-674, 2018
602018
Does Fiat-Shamir require a cryptographic hash function?
Y Chen, A Lombardi, F Ma, W Quach
Annual International Cryptology Conference, 334-363, 2021
402021
New constructions of reusable designated-verifier NIZKs
A Lombardi, W Quach, RD Rothblum, D Wichs, DJ Wu
Annual International Cryptology Conference, 670-700, 2019
402019
Reusable designated-verifier NIZKs for all NP from CDH
W Quach, RD Rothblum, D Wichs
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
392019
Succinct LWE sampling, random polynomials, and obfuscation
L Devadas, W Quach, V Vaikuntanathan, H Wee, D Wichs
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021
37*2021
Watermarking PRFs under standard assumptions: public marking and security with extraction queries
W Quach, D Wichs, G Zirdelis
Theory of Cryptography: 16th International Conference, TCC 2018, Panaji …, 2018
342018
UC-secure OT from LWE, revisited
W Quach
Security and Cryptography for Networks: 12th International Conference, SCN …, 2020
232020
Broadcast and trace with ciphertext size from standard assumptions
R Goyal, W Quach, B Waters, D Wichs
Annual International Cryptology Conference, 826-855, 2019
202019
Speak much, remember little: Cryptography in the bounded storage model, revisited
Y Dodis, W Quach, D Wichs
Annual International Conference on the Theory and Applications of …, 2023
14*2023
Targeted lossy functions and applications
W Quach, B Waters, D Wichs
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
102021
Authentication in the bounded storage model
Y Dodis, W Quach, D Wichs
Annual International Conference on the Theory and Applications of …, 2022
82022
A makespan lower bound for the scheduling of the tiled cholesky factorization based on alap schedule
O Beaumont, J Langou, W Quach, A Shilova
EuroPar 2020-26th International European Conference on Parallel and …, 2020
7*2020
Leakage-resilient key exchange and two-seed extractors
X Li, F Ma, W Quach, D Wichs
Annual International Cryptology Conference, 401-429, 2020
52020
A note on non-interactive zero-knowledge from CDH
G Couteau, A Jain, Z Jin, W Quach
Annual International Cryptology Conference, 731-764, 2023
42023
Post-quantum insecurity from LWE
A Lombardi, E Mook, W Quach, D Wichs
Theory of Cryptography Conference, 3-32, 2022
42022
Lower Bounds on Anonymous Whistleblowing
W Quach, LK Tyner, D Wichs
Theory of Cryptography Conference, 3-32, 2023
2023
Advanced Functionalities and Post-Quantum Security Through the Lens of Lattice-Based Cryptography
W Quach
Northeastern University, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–18