Status report on the first round of the NIST post-quantum cryptography standardization process G Alagic, G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, YK Liu, ... US Department of Commerce, National Institute of Standards and Technology, 2019 | 80 | 2019 |
Method for using a motorized camera mount for tracking in augmented reality AW Hobgood, JF Ebersole Jr, JF Walker, JF Ebersole US Patent 6,903,707, 2005 | 78 | 2005 |
Verifiable oblivious storage D Apon, J Katz, E Shi, A Thiruvengadam International Workshop on Public Key Cryptography, 131-148, 2014 | 73 | 2014 |
POPE: Partial order preserving encoding DS Roche, D Apon, SG Choi, A Yerukhimovich Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 59 | 2016 |
Implementing Cryptographic Program Obfuscation. D Apon, Y Huang, J Katz, AJ Malozemoff IACR Cryptol. ePrint Arch. 2014, 779, 2014 | 51 | 2014 |
Cryptanalysis of indistinguishability obfuscations of circuits over GGH13 D Apon, N Döttling, S Garg, P Mukherjee 44th International Colloquium on Automata, Languages, and Programming (ICALP …, 2017 | 44 | 2017 |
Efficient, reusable fuzzy extractors from LWE D Apon, C Cho, K Eldefrawy, J Katz International Conference on Cyber Security Cryptography and Machine Learning …, 2017 | 30 | 2017 |
5gen: A framework for prototyping applications using multilinear maps and matrix branching programs K Lewi, AJ Malozemoff, D Apon, B Carmer, A Foltzer, D Wagner, ... Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 30 | 2016 |
Dimension-Preserving Reductions from LWE to LWR. J Alperin-Sheriff, D Apon IACR Cryptol. ePrint Arch. 2016, 589, 2016 | 24 | 2016 |
Status report on the second round of the NIST post-quantum cryptography standardization process G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, J Kelsey, YK Liu, ... US Department of Commerce, NIST, 2020 | 23 | 2020 |
Fully-Secure Lattice-Based IBE as Compact as PKE. D Apon, X Fan, FH Liu IACR Cryptol. ePrint Arch. 2016, 125, 2016 | 13 | 2016 |
Hierarchical decomposition of a manufacturing work cell to promote monitoring, diagnostics, and prognostics BA Weiss, G Qiao International Manufacturing Science and Engineering Conference 50749 …, 2017 | 12 | 2017 |
Compact identity based encryption from LWE D Apon, X Fan, F Liu Cryptology ePrint Archive 2016, 2016 | 11 | 2016 |
Deniable attribute based encryption for branching programs from LWE D Apon, X Fan, FH Liu Theory of Cryptography Conference, 299-329, 2016 | 10 | 2016 |
Constant-round group key exchange from the ring-LWE assumption D Apon, D Dachman-Soled, H Gong, J Katz International Conference on Post-Quantum Cryptography, 189-205, 2019 | 9 | 2019 |
NISTIR 8240 status report on the first round of the NIST post-quantum cryptography standardization process G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, YK Liu, C Miller, ... National Institute of Standards and Technology (NIST), US Department of …, 2019 | 9 | 2019 |
Vector Encoding over Lattices and Its Applications. D Apon, X Fan, FH Liu IACR Cryptol. ePrint Arch. 2017, 455, 2017 | 6 | 2017 |
An NP-complete problem in grid coloring, 2012 D Apon, W Gasarch, K Lawler | 6 | |
Cryptanalysis of ledacrypt D Apon, R Perlner, A Robinson, P Santini Annual International Cryptology Conference, 389-418, 2020 | 5 | 2020 |
Bi-Deniable Inner Product Encryption from LWE. D Apon, X Fan, FH Liu IACR Cryptol. ePrint Arch. 2015, 993, 2015 | 5 | 2015 |