What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Chris Peikert
Google Scholar
47
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/cic
FrodoKEM: A CCA-Secure Learning With Errors Key Encapsulation Mechanism.
Lewis Glabush
Patrick Longa
Michael Naehrig
Chris Peikert
Douglas Stebila
Fernando Virdia
2024
journals/joc
Algebraically Structured LWE, Revisited.
Chris Peikert
Zachary Pepin
2024
conf/crypto
Cryptanalysis of Lattice-Based Sequentiality Assumptions and Proofs of Sequential Work.
Chris Peikert
Yi Tang
2023
conf/ctrsa
Classical and Quantum Security of Elliptic Curve VRF, via Relative Indifferentiability.
Chris Peikert
Jiayu Xu
2023
conf/eurocrypt
Functional Commitments for All Functions, with Transparent Setup and from SIS.
Leo de Castro
Chris Peikert
2021
conf/tcc
Vector and Functional Commitments from Lattices.
Chris Peikert
Zachary Pepin
Chad Sharp
2020
conf/pkc
Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography.
Nicholas Genise
Daniele Micciancio
Chris Peikert
Michael Walter
2020
conf/pkc
Constraining and Watermarking PRFs from Milder Assumptions.
Chris Peikert
Sina Shiehian
2020
conf/eurocrypt
He Gives C-Sieves on the CSIDH.
Chris Peikert
2019
conf/crypto
Noninteractive Zero Knowledge for NP from (Plain) Learning with Errors.
Chris Peikert
Sina Shiehian
2019
conf/tcc
Algebraically Structured LWE, Revisited.
Chris Peikert
Zachary Pepin
2018
conf/ccs
ALCHEMY: A Language and Compiler for Homomorphic Encryption Made easY.
Eric Crockett
Chris Peikert
Chad Sharp
2018
conf/pkc
Privately Constraining and Programming PRFs, the LWE Way.
Chris Peikert
Sina Shiehian
2018
conf/pkc
New (and Old) Proof Systems for Lattice Problems.
Navid Alamati
Chris Peikert
Noah Stephens-Davidowitz
2016
conf/ccs
Λολ: Functional Lattice Cryptography.
Eric Crockett
Chris Peikert
2016
conf/crypto
Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE.
Navid Alamati
Chris Peikert
2016
conf/eurocrypt
Recovering Short Generators of Principal Ideals in Cyclotomic Rings.
Ronald Cramer
Léo Ducas
Chris Peikert
Oded Regev
2016
conf/tcc
Multi-key FHE from LWE, Revisited.
Chris Peikert
Sina Shiehian
2015
journals/joc
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs.
Craig Gentry
Jens Groth
Yuval Ishai
Chris Peikert
Amit Sahai
Adam D. Smith
2015
conf/tcc
Key-Homomorphic Constrained Pseudorandom Functions.
Abhishek Banerjee
Georg Fuchsbauer
Chris Peikert
Krzysztof Pietrzak
Sophie Stevens
2014
conf/fse
SPRING: Fast Pseudorandom Functions from Rounded Ring Products.
Abhishek Banerjee
Hai Brenner
Gaëtan Leurent
Chris Peikert
Alon Rosen
2014
conf/crypto
New and Improved Key-Homomorphic Pseudorandom Functions.
Abhishek Banerjee
Chris Peikert
2014
conf/crypto
Faster Bootstrapping with Polynomial Error.
Jacob Alperin-Sheriff
Chris Peikert
2013
conf/crypto
Practical Bootstrapping in Quasilinear Time.
Jacob Alperin-Sheriff
Chris Peikert
2013
conf/crypto
Hardness of SIS and LWE with Small Parameters.
Daniele Micciancio
Chris Peikert
2013
conf/acns
How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE.
Rikke Bendlin
Sara Krehbiel
Chris Peikert
2013
conf/eurocrypt
A Toolkit for Ring-LWE Cryptography.
Vadim Lyubashevsky
Chris Peikert
Oded Regev
2012
journals/joc
Bonsai Trees, or How to Delegate a Lattice Basis.
David Cash
Dennis Hofheinz
Eike Kiltz
Chris Peikert
2012
conf/pkc
Circular and KDM Security for Identity-Based Encryption.
Jacob Alperin-Sheriff
Chris Peikert
2012
conf/eurocrypt
Pseudorandom Functions and Lattices.
Abhishek Banerjee
Chris Peikert
Alon Rosen
2012
conf/eurocrypt
Identity-Based (Lossy) Trapdoor Functions and Applications.
Mihir Bellare
Eike Kiltz
Chris Peikert
Brent Waters
2012
conf/eurocrypt
Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller.
Daniele Micciancio
Chris Peikert
2011
conf/crypto
Bi-Deniable Public-Key Encryption.
Adam O'Neill
Chris Peikert
Brent Waters
2011
conf/ctrsa
Better Key Sizes (and Attacks) for LWE-Based Encryption.
Richard Lindner
Chris Peikert
2010
conf/crypto
An Efficient and Parallel Gaussian Sampler for Lattices.
Chris Peikert
2010
conf/eurocrypt
On Ideal Lattices and Learning with Errors over Rings.
Vadim Lyubashevsky
Chris Peikert
Oded Regev
2010
conf/eurocrypt
Bonsai Trees, or How to Delegate a Lattice Basis.
David Cash
Dennis Hofheinz
Eike Kiltz
Chris Peikert
2010
conf/tcc
Public-Key Encryption Schemes with Auxiliary Inputs.
Yevgeniy Dodis
Shafi Goldwasser
Yael Tauman Kalai
Chris Peikert
Vinod Vaikuntanathan
2009
conf/crypto
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems.
Benny Applebaum
David Cash
Chris Peikert
Amit Sahai
2009
conf/tcc
Some Recent Progress in Lattice-Based Cryptography.
Chris Peikert
2008
conf/fse
SWIFFT: A Modest Proposal for FFT Hashing.
Vadim Lyubashevsky
Daniele Micciancio
Chris Peikert
Alon Rosen
2008
conf/crypto
Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems.
Chris Peikert
Vinod Vaikuntanathan
2008
conf/crypto
A Framework for Efficient and Composable Oblivious Transfer.
Chris Peikert
Vinod Vaikuntanathan
Brent Waters
2006
conf/tcc
On Error Correction in the Exponent.
Chris Peikert
2006
conf/tcc
Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices.
Chris Peikert
Alon Rosen
2005
conf/tcc
Optimal Error Correction Against Computationally Bounded Noise.
Silvio Micali
Chris Peikert
Madhu Sudan
David A. Wilson
2001
conf/asiacrypt
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes.
Anna Lysyanskaya
Chris Peikert
Coauthors
Abhishek Banerjee
(4)
Adam D. Smith
(1)
Adam O'Neill
(1)
Alon Rosen
(4)
Amit Sahai
(2)
Anna Lysyanskaya
(1)
Benny Applebaum
(1)
Brent Waters
(3)
Chad Sharp
(2)
Chris Peikert
(47)
Craig Gentry
(1)
Daniele Micciancio
(4)
David A. Wilson
(1)
David Cash
(3)
Dennis Hofheinz
(2)
Douglas Stebila
(1)
Eike Kiltz
(3)
Eric Crockett
(2)
Fernando Virdia
(1)
Gaëtan Leurent
(1)
Georg Fuchsbauer
(1)
Hai Brenner
(1)
Jacob Alperin-Sheriff
(3)
Jens Groth
(1)
Jiayu Xu
(1)
Krzysztof Pietrzak
(1)
Leo de Castro
(1)
Léo Ducas
(1)
Lewis Glabush
(1)
Madhu Sudan
(1)
Michael Naehrig
(1)
Michael Walter
(1)
Mihir Bellare
(1)
Navid Alamati
(2)
Nicholas Genise
(1)
Noah Stephens-Davidowitz
(1)
Oded Regev
(3)
Patrick Longa
(1)
Richard Lindner
(1)
Rikke Bendlin
(1)
Ronald Cramer
(1)
Sara Krehbiel
(1)
Shafi Goldwasser
(1)
Silvio Micali
(1)
Sina Shiehian
(4)
Sophie Stevens
(1)
Vadim Lyubashevsky
(3)
Vinod Vaikuntanathan
(3)
Yael Tauman Kalai
(1)
Yevgeniy Dodis
(1)
Yi Tang
(1)
Yuval Ishai
(1)
Zachary Pepin
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to