Laconic function evaluation and applications W Quach, H Wee, D Wichs 2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS …, 2018 | 60 | 2018 |
Hash proof systems over lattices revisited F Benhamouda, O Blazy, L Ducas, W Quach IACR International Workshop on Public Key Cryptography, 644-674, 2018 | 55 | 2018 |
New constructions of reusable designated-verifier NIZKs A Lombardi, W Quach, RD Rothblum, D Wichs, DJ Wu Annual International Cryptology Conference, 670-700, 2019 | 40 | 2019 |
Does Fiat-Shamir require a cryptographic hash function? Y Chen, A Lombardi, F Ma, W Quach Annual International Cryptology Conference, 334-363, 2021 | 35 | 2021 |
Succinct LWE sampling, random polynomials, and obfuscation L Devadas, W Quach, V Vaikuntanathan, H Wee, D Wichs Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021 | 35* | 2021 |
Reusable designated-verifier NIZKs for all NP from CDH W Quach, RD Rothblum, D Wichs Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 35 | 2019 |
Watermarking PRFs under standard assumptions: public marking and security with extraction queries W Quach, D Wichs, G Zirdelis Theory of Cryptography: 16th International Conference, TCC 2018, Panaji …, 2018 | 33 | 2018 |
Broadcast and trace with ciphertext size from standard assumptions R Goyal, W Quach, B Waters, D Wichs Annual International Cryptology Conference, 826-855, 2019 | 20 | 2019 |
UC-secure OT from LWE, revisited W Quach Security and Cryptography for Networks: 12th International Conference, SCN …, 2020 | 18 | 2020 |
Speak much, remember little: Cryptography in the bounded storage model, revisited Y Dodis, W Quach, D Wichs Annual International Conference on the Theory and Applications of …, 2023 | 12* | 2023 |
Targeted lossy functions and applications W Quach, B Waters, D Wichs Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021 | 10 | 2021 |
Authentication in the bounded storage model Y Dodis, W Quach, D Wichs Annual International Conference on the Theory and Applications of …, 2022 | 8 | 2022 |
A makespan lower bound for the scheduling of the tiled cholesky factorization based on alap schedule O Beaumont, J Langou, W Quach, A Shilova EuroPar 2020-26th International European Conference on Parallel and …, 2020 | 7* | 2020 |
Leakage-resilient key exchange and two-seed extractors X Li, F Ma, W Quach, D Wichs Annual International Cryptology Conference, 401-429, 2020 | 5 | 2020 |
Post-quantum insecurity from LWE A Lombardi, E Mook, W Quach, D Wichs Theory of Cryptography Conference, 3-32, 2022 | 4 | 2022 |
A note on non-interactive zero-knowledge from CDH G Couteau, A Jain, Z Jin, W Quach Annual International Cryptology Conference, 731-764, 2023 | 1 | 2023 |
Lower Bounds on Anonymous Whistleblowing W Quach, LK Tyner, D Wichs Theory of Cryptography Conference, 3-32, 2023 | | 2023 |
Advanced Functionalities and Post-Quantum Security Through the Lens of Lattice-Based Cryptography W Quach Northeastern University, 2023 | | 2023 |