What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Sanjam Garg
Google Scholar
ORCID:
0000-0003-1330-0419
94
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
SoK: Watermarking for AI-Generated Content.
Xuandong Zhao
Sam Gunn
Miranda Christ
Jaiden Fairoze
Andres Fabrega
Nicholas Carlini
Sanjam Garg
Sanghyun Hong
Milad Nasr
Florian Tramèr
Somesh Jha
Lei Li
Yu-Xiang Wang
Dawn Song
2025
conf/pkc
Split Prover Zero-Knowledge SNARKs.
Sanjam Garg
Aarushi Goel
Dimitris Kolonelos
Sina Shiehian
Rohit Sinha
2025
conf/crypto
Malicious Security in Collaborative zk-SNARKs: More than Meets the Eye.
Sanjam Garg
Aarushi Goel
Abhishek Jain
Bhaskar Roberts
Sruthi Sekar
2025
conf/crypto
A Framework for Witness Encryption from Linearly Verifiable SNARKs and Applications.
Sanjam Garg
Mohammad Hajiabadi
Dimitris Kolonelos
Abhiram Kothapalli
Guru-Vamsi Policharla
2025
conf/uss
Practical Mempool Privacy via One-time Setup Batched Threshold Encryption.
Arka Rai Choudhuri
Sanjam Garg
Guru-Vamsi Policharla
Mingyuan Wang
2024
journals/cic
Publicly-Detectable Watermarking for Language Models.
Jaiden Fairoze
Sanjam Garg
Somesh Jha
Saeed Mahloujifar
Mohammad Mahmoody
Mingyuan Wang
2024
journals/popets
SublonK: Sublinear Prover PlonK.
Arka Rai Choudhuri
Sanjam Garg
Aarushi Goel
Sruthi Sekar
Rohit Sinha
2024
conf/uss
Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses.
Arka Rai Choudhuri
Sanjam Garg
Julien Piet
Guru-Vamsi Policharla
2024
conf/crypto
How to Prove Statements Obliviously?
Sanjam Garg
Aarushi Goel
Mingyuan Wang
2024
conf/crypto
Threshold Encryption with Silent Setup.
Sanjam Garg
Dimitris Kolonelos
Guru-Vamsi Policharla
Mingyuan Wang
2024
conf/crypto
Scalable Multiparty Computation from Non-linear Secret Sharing.
Sanjam Garg
Abhishek Jain
Pratyay Mukherjee
Mingyuan Wang
2024
conf/sp
hinTS: Threshold Signatures with Silent Setup.
Sanjam Garg
Abhishek Jain
Pratyay Mukherjee
Rohit Sinha
Mingyuan Wang
Yinuo Zhang
2024
conf/pkc
Laconic Branching Programs from the Diffie-Hellman Assumption.
Sanjam Garg
Mohammad Hajiabadi
Peihan Miao
Alice Murphy
2023
journals/joc
Candidate iO from Homomorphic Encryption Schemes.
Zvika Brakerski
Nico Döttling
Sanjam Garg
Giulio Malavolta
2023
conf/ccs
Experimenting with Zero-Knowledge Proofs of Training.
Sanjam Garg
Aarushi Goel
Somesh Jha
Saeed Mahloujifar
Mohammad Mahmoody
Guru-Vamsi Policharla
Mingyuan Wang
2023
conf/uss
zkSaaS: Zero-Knowledge SNARKs as a Service.
Sanjam Garg
Aarushi Goel
Abhishek Jain
Guru-Vamsi Policharla
Sruthi Sekar
2023
conf/crypto
Cryptography with Weights: MPC, Encryption and Signatures.
Sanjam Garg
Abhishek Jain
Pratyay Mukherjee
Rohit Sinha
Mingyuan Wang
Yinuo Zhang
2023
conf/crypto
Correlation Intractability and SNARGs from Sub-exponential DDH.
Arka Rai Choudhuri
Sanjam Garg
Abhishek Jain
Zhengzhong Jin
Jiaheng Zhang
2023
conf/sp
Threshold Signatures in the Multiverse.
Leemon Baird
Sanjam Garg
Abhishek Jain
Pratyay Mukherjee
Rohit Sinha
Mingyuan Wang
Yinuo Zhang
2023
conf/pkc
Credibility in Private Set Membership.
Sanjam Garg
Mohammad Hajiabadi
Abhishek Jain
Zhengzhong Jin
Omkant Pandey
Sina Shiehian
2023
conf/eurocrypt
End-to-End Secure Messaging with Traceability Only for Illegal Content.
James Bartusek
Sanjam Garg
Abhishek Jain
Guru-Vamsi Policharla
2022
journals/popets
Deletion inference, reconstruction, and compliance in machine (un)learning.
Ji Gao
Sanjam Garg
Mohammad Mahmoody
Prashant Nalini Vasudevan
2022
conf/ccs
Succinct Zero Knowledge for Floating Point Computations.
Sanjam Garg
Abhishek Jain
Zhengzhong Jin
Yinuo Zhang
2022
conf/crypto
A More Complete Analysis of the Signal Double Ratchet Algorithm.
Alexander Bienstock
Jaiden Fairoze
Sanjam Garg
Pratyay Mukherjee
Srinivasan Raghuraman
2022
conf/pkc
Reusable Two-Round MPC from LPN.
James Bartusek
Sanjam Garg
Akshayaram Srinivasan
Yinuo Zhang
2022
conf/tcc
On the Worst-Case Inefficiency of CGKA.
Alexander Bienstock
Yevgeniy Dodis
Sanjam Garg
Garrison Grogan
Mohammad Hajiabadi
Paul Rösler
2022
conf/tcc
IBE with Incompressible Master Secret and Small Identity Secrets.
Nico Döttling
Sanjam Garg
Sruthi Sekar
Mingyuan Wang
2021
conf/crypto
Compact Ring Signatures from Learning with Errors.
Rohit Chatterjee
Sanjam Garg
Mohammad Hajiabadi
Dakshita Khurana
Xiao Liang
Giulio Malavolta
Omkant Pandey
Sina Shiehian
2021
conf/sp
Is Private Learning Possible with Instance Encoding?
Nicholas Carlini
Samuel Deng
Sanjam Garg
Somesh Jha
Saeed Mahloujifar
Mohammad Mahmoody
Abhradeep Thakurta
Florian Tramèr
2021
conf/asiacrypt
How to Build a Trapdoor Function from an Encryption Scheme.
Sanjam Garg
Mohammad Hajiabadi
Giulio Malavolta
Rafail Ostrovsky
2021
conf/tcc
Laconic Private Set Intersection and Applications.
Navid Alamati
Pedro Branco
Nico Döttling
Sanjam Garg
Mohammad Hajiabadi
Sihang Pu
2021
conf/tcc
Amortizing Rate-1 OT and Applications to PIR and PSI.
Melissa Chase
Sanjam Garg
Mohammad Hajiabadi
Jialin Li
Peihan Miao
2020
conf/pkc
Master-Key KDM-Secure IBE from Pairings.
Sanjam Garg
Romain Gay
Mohammad Hajiabadi
2020
conf/eurocrypt
Formalizing Data Deletion in the Context of the Right to Be Forgotten.
Sanjam Garg
Shafi Goldwasser
Prashant Nalini Vasudevan
2020
conf/eurocrypt
Candidate iO from Homomorphic Encryption Schemes.
Zvika Brakerski
Nico Döttling
Sanjam Garg
Giulio Malavolta
2020
conf/eurocrypt
Two-Round Oblivious Transfer from CDH or LPN.
Nico Döttling
Sanjam Garg
Mohammad Hajiabadi
Daniel Masny
Daniel Wichs
2020
conf/tcc
Constant Ciphertext-Rate Non-committing Encryption from Standard Assumptions.
Zvika Brakerski
Pedro Branco
Nico Döttling
Sanjam Garg
Giulio Malavolta
2020
conf/tcc
Reusable Two-Round MPC from DDH.
James Bartusek
Sanjam Garg
Daniel Masny
Pratyay Mukherjee
2020
conf/tcc
Efficient Range-Trapdoor Functions and Applications: Rate-1 OT and More.
Sanjam Garg
Mohammad Hajiabadi
Rafail Ostrovsky
2020
conf/tcc
FHE-Based Bootstrapping of Designated-Prover NIZK.
Zvika Brakerski
Sanjam Garg
Rotem Tsabary
2019
conf/crypto
Trapdoor Hash Functions and Their Applications.
Nico Döttling
Sanjam Garg
Yuval Ishai
Giulio Malavolta
Tamer Mour
Rafail Ostrovsky
2019
conf/pkc
Registration-Based Encryption from Standard Assumptions.
Sanjam Garg
Mohammad Hajiabadi
Mohammad Mahmoody
Ahmadreza Rahimi
Sruthi Sekar
2019
conf/eurocrypt
New Techniques for Efficient Trapdoor Functions and Applications.
Sanjam Garg
Romain Gay
Mohammad Hajiabadi
2019
conf/asiacrypt
The Broadcast Message Complexity of Secure Multiparty Computation.
Sanjam Garg
Aarushi Goel
Abhishek Jain
2019
conf/asiacrypt
Rate-1 Trapdoor Functions from the Diffie-Hellman Problem.
Nico Döttling
Sanjam Garg
Mohammad Hajiabadi
Kevin Liu
Giulio Malavolta
2019
conf/tcc
Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles.
Zvika Brakerski
Nico Döttling
Sanjam Garg
Giulio Malavolta
2018
conf/crypto
Adaptive Garbled RAM from Laconic Oblivious Transfer.
Sanjam Garg
Rafail Ostrovsky
Akshayaram Srinivasan
2018
conf/crypto
Limits on the Power of Garbling Techniques for Public-Key Encryption.
Sanjam Garg
Mohammad Hajiabadi
Mohammad Mahmoody
Ameer Mohammed
2018
conf/crypto
Trapdoor Functions from the Computational Diffie-Hellman Assumption.
Sanjam Garg
Mohammad Hajiabadi
2018
conf/crypto
On the Round Complexity of OT Extension.
Sanjam Garg
Mohammad Mahmoody
Daniel Masny
Izaak Meckler
2018
conf/crypto
Two-Round Multiparty Secure Computation Minimizing Public Key Operations.
Sanjam Garg
Peihan Miao
Akshayaram Srinivasan
2018
conf/pkc
New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes.
Nico Döttling
Sanjam Garg
Mohammad Hajiabadi
Daniel Masny
2018
conf/eurocrypt
A New Approach to Black-Box Concurrent Secure Computation.
Sanjam Garg
Susumu Kiyoshima
Omkant Pandey
2018
conf/eurocrypt
Two-Round Multiparty Secure Computation from Minimal Assumptions.
Sanjam Garg
Akshayaram Srinivasan
2018
conf/eurocrypt
Adaptively Secure Garbling with Near Optimal Online Complexity.
Sanjam Garg
Akshayaram Srinivasan
2018
conf/tcc
Two-Round MPC: Information-Theoretic and Black-Box.
Sanjam Garg
Yuval Ishai
Akshayaram Srinivasan
2018
conf/tcc
Registration-Based Encryption: Removing Private-Key Generator from IBE.
Sanjam Garg
Mohammad Hajiabadi
Mohammad Mahmoody
Ahmadreza Rahimi
2018
conf/tcc
A Simple Construction of iO for Turing Machines.
Sanjam Garg
Akshayaram Srinivasan
2017
conf/crypto
Incremental Program Obfuscation.
Sanjam Garg
Omkant Pandey
2017
conf/crypto
Lower Bounds on Obfuscation from All-or-Nothing Encryption Primitives.
Sanjam Garg
Mohammad Mahmoody
Ameer Mohammed
2017
conf/crypto
Laconic Oblivious Transfer and Its Applications.
Chongwon Cho
Nico Döttling
Sanjam Garg
Divya Gupta
Peihan Miao
Antigoni Polychroniadou
2017
conf/crypto
Identity-Based Encryption from the Diffie-Hellman Assumption.
Nico Döttling
Sanjam Garg
2017
conf/eurocrypt
On the Exact Round Complexity of Self-composable Two-Party Computation.
Sanjam Garg
Susumu Kiyoshima
Omkant Pandey
2017
conf/eurocrypt
Breaking the Sub-Exponential Barrier in Obfustopia.
Sanjam Garg
Omkant Pandey
Akshayaram Srinivasan
Mark Zhandry
2017
conf/asiacrypt
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions.
Saikrishna Badrinarayanan
Sanjam Garg
Yuval Ishai
Amit Sahai
Akshay Wadia
2017
conf/tcc
When Does Functional Encryption Imply Obfuscation?
Sanjam Garg
Mohammad Mahmoody
Ameer Mohammed
2017
conf/tcc
From Selective IBE to Full IBE and Selective HIBE.
Nico Döttling
Sanjam Garg
2016
conf/crypto
TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption.
Sanjam Garg
Payman Mohassel
Charalampos Papamanthou
2016
conf/crypto
Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium.
Sanjam Garg
Omkant Pandey
Akshayaram Srinivasan
2016
conf/eurocrypt
The Exact Round Complexity of Secure Computation.
Sanjam Garg
Pratyay Mukherjee
Omkant Pandey
Antigoni Polychroniadou
2016
conf/tcc
Secure Multiparty RAM Computation in Constant Rounds.
Sanjam Garg
Divya Gupta
Peihan Miao
Omkant Pandey
2016
conf/tcc
Functional Encryption Without Obfuscation.
Sanjam Garg
Craig Gentry
Shai Halevi
Mark Zhandry
2016
conf/tcc
Single-Key to Multi-Key Functional Encryption with Polynomial Loss.
Sanjam Garg
Akshayaram Srinivasan
2016
conf/tcc
Secure Obfuscation in a Weak Multilinear Map Model.
Sanjam Garg
Eric Miles
Pratyay Mukherjee
Amit Sahai
Akshayaram Srinivasan
Mark Zhandry
2015
conf/crypto
Cryptography with One-Way Communication.
Sanjam Garg
Yuval Ishai
Eyal Kushilevitz
Rafail Ostrovsky
Amit Sahai
2015
conf/tcc
Two-Round Adaptively Secure MPC from Indistinguishability Obfuscation.
Sanjam Garg
Antigoni Polychroniadou
2014
conf/crypto
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input.
Sanjam Garg
Craig Gentry
Shai Halevi
Daniel Wichs
2014
conf/pkc
Cross-Domain Secure Computation.
Chongwon Cho
Sanjam Garg
Rafail Ostrovsky
2014
conf/eurocrypt
Protecting Obfuscation against Algebraic Attacks.
Boaz Barak
Sanjam Garg
Yael Tauman Kalai
Omer Paneth
Amit Sahai
2014
conf/eurocrypt
Efficient Round Optimal Blind Signatures.
Sanjam Garg
Divya Gupta
2014
conf/tcc
Two-Round Secure MPC from Indistinguishability Obfuscation.
Sanjam Garg
Craig Gentry
Shai Halevi
Mariana Raykova
2013
conf/crypto
Attribute-Based Encryption for Circuits from Multilinear Maps.
Sanjam Garg
Craig Gentry
Shai Halevi
Amit Sahai
Brent Waters
2013
conf/crypto
Secure Computation against Adaptive Auxiliary Information.
Elette Boyle
Sanjam Garg
Abhishek Jain
Yael Tauman Kalai
Amit Sahai
2013
conf/eurocrypt
Candidate Multilinear Maps from Ideal Lattices.
Sanjam Garg
Craig Gentry
Shai Halevi
2013
conf/tcc
Why "Fiat-Shamir for Proofs" Lacks a Proof.
Nir Bitansky
Dana Dachman-Soled
Sanjam Garg
Abhishek Jain
Yael Tauman Kalai
Adriana López-Alt
Daniel Wichs
2012
conf/crypto
Adaptively Secure Multi-Party Computation with Dishonest Majority.
Sanjam Garg
Amit Sahai
2012
conf/crypto
Impossibility Results for Static Input Secure Computation.
Sanjam Garg
Abishek Kumarasubramanian
Rafail Ostrovsky
Ivan Visconti
2012
conf/eurocrypt
Concurrently Secure Computation in Constant Rounds.
Sanjam Garg
Vipul Goyal
Abhishek Jain
Amit Sahai
2012
conf/tcc
Resettable Statistical Zero Knowledge.
Sanjam Garg
Rafail Ostrovsky
Ivan Visconti
Akshay Wadia
2011
conf/crypto
Round Optimal Blind Signatures.
Sanjam Garg
Vanishree Rao
Amit Sahai
Dominique Schröder
Dominique Unruh
2011
conf/crypto
Leakage-Resilient Zero Knowledge.
Sanjam Garg
Abhishek Jain
Amit Sahai
2011
conf/tcc
Bringing People of Different Beliefs Together to Do UC.
Sanjam Garg
Vipul Goyal
Abhishek Jain
Amit Sahai
2010
conf/ccs
Building efficient fully collusion-resilient traitor tracing and revocation schemes.
Sanjam Garg
Abishek Kumarasubramanian
Amit Sahai
Brent Waters
2008
conf/crypto
Improved Bounds on Security Reductions for Discrete Log Based Signatures.
Sanjam Garg
Raghav Bhaskar
Satyanarayana V. Lokam
Coauthors
Aarushi Goel
(7)
Abhiram Kothapalli
(1)
Abhishek Jain
(16)
Abhradeep Thakurta
(1)
Abishek Kumarasubramanian
(2)
Adriana López-Alt
(1)
Ahmadreza Rahimi
(2)
Akshay Wadia
(2)
Akshayaram Srinivasan
(11)
Alexander Bienstock
(2)
Alice Murphy
(1)
Ameer Mohammed
(3)
Amit Sahai
(12)
Andrés Fábrega
(1)
Antigoni Polychroniadou
(3)
Arka Rai Choudhuri
(4)
Bhaskar Roberts
(1)
Boaz Barak
(1)
Brent Waters
(2)
Charalampos Papamanthou
(1)
Chongwon Cho
(2)
Craig Gentry
(5)
Dakshita Khurana
(1)
Dana Dachman-Soled
(1)
Daniel Masny
(4)
Daniel Wichs
(3)
Dawn Song
(1)
Dimitris Kolonelos
(3)
Divya Gupta
(3)
Dominique Schröder
(1)
Dominique Unruh
(1)
Elette Boyle
(1)
Eric Miles
(1)
Eyal Kushilevitz
(1)
Florian Tramèr
(2)
Garrison Grogan
(1)
Giulio Malavolta
(8)
Guru-Vamsi Policharla
(7)
Ivan Visconti
(2)
Izaak Meckler
(1)
Jaiden Fairoze
(3)
James Bartusek
(3)
Ji Gao
(1)
Jiaheng Zhang
(1)
Jialin Li
(1)
Julien Piet
(1)
Kevin Liu
(1)
Leemon Baird
(1)
Lei Li
(1)
Mariana Raykova
(1)
Mark Zhandry
(3)
Melissa Chase
(1)
Milad Nasr
(1)
Mingyuan Wang
(10)
Miranda Christ
(1)
Mohammad Hajiabadi
(18)
Mohammad Mahmoody
(10)
Navid Alamati
(1)
Nicholas Carlini
(2)
Nico Döttling
(13)
Nir Bitansky
(1)
Omer Paneth
(1)
Omkant Pandey
(9)
Paul Rösler
(1)
Payman Mohassel
(1)
Pedro Branco
(2)
Peihan Miao
(5)
Prashant Nalini Vasudevan
(2)
Pratyay Mukherjee
(8)
Rafail Ostrovsky
(8)
Raghav Bhaskar
(1)
Rohit Chatterjee
(1)
Rohit Sinha
(5)
Romain Gay
(2)
Rotem Tsabary
(1)
Saeed Mahloujifar
(3)
Saikrishna Badrinarayanan
(1)
Sam Gunn
(1)
Samuel Deng
(1)
Sanghyun Hong
(1)
Sanjam Garg
(94)
Satyanarayana V. Lokam
(1)
Shafi Goldwasser
(1)
Shai Halevi
(5)
Sihang Pu
(1)
Sina Shiehian
(3)
Somesh Jha
(4)
Srinivasan Raghuraman
(1)
Sruthi Sekar
(5)
Susumu Kiyoshima
(2)
Tamer Mour
(1)
Vanishree Rao
(1)
Vipul Goyal
(2)
Xiao Liang
(1)
Xuandong Zhao
(1)
Yael Tauman Kalai
(3)
Yevgeniy Dodis
(1)
Yinuo Zhang
(5)
Yu-Xiang Wang
(1)
Yuval Ishai
(4)
Zhengzhong Jin
(3)
Zvika Brakerski
(5)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to