Daniel Apon
Daniel Apon
Verified email at cs.umd.edu
Title
Cited by
Cited by
Year
Method for using a motorized camera mount for tracking in augmented reality
AW Hobgood, JF Ebersole Jr, JF Walker, JF Ebersole
US Patent 6,903,707, 2005
782005
Verifiable oblivious storage
D Apon, J Katz, E Shi, A Thiruvengadam
International Workshop on Public Key Cryptography, 131-148, 2014
702014
Status report on the first round of the NIST post-quantum cryptography standardization process
G Alagic, G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, YK Liu, ...
US Department of Commerce, National Institute of Standards and Technology, 2019
572019
POPE: Partial order preserving encoding
DS Roche, D Apon, SG Choi, A Yerukhimovich
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
522016
Implementing Cryptographic Program Obfuscation.
D Apon, Y Huang, J Katz, AJ Malozemoff
IACR Cryptol. ePrint Arch. 2014, 779, 2014
482014
Cryptanalysis of indistinguishability obfuscations of circuits over GGH13
D Apon, N Döttling, S Garg, P Mukherjee
44th International Colloquium on Automata, Languages, and Programming (ICALP …, 2017
412017
Efficient, reusable fuzzy extractors from LWE
D Apon, C Cho, K Eldefrawy, J Katz
International Conference on Cyber Security Cryptography and Machine Learning …, 2017
272017
5gen: A framework for prototyping applications using multilinear maps and matrix branching programs
K Lewi, AJ Malozemoff, D Apon, B Carmer, A Foltzer, D Wagner, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
272016
Dimension-Preserving Reductions from LWE to LWR.
J Alperin-Sheriff, D Apon
IACR Cryptol. ePrint Arch. 2016, 589, 2016
242016
Fully-Secure Lattice-Based IBE as Compact as PKE.
D Apon, X Fan, FH Liu
IACR Cryptol. ePrint Arch. 2016, 125, 2016
132016
Hierarchical decomposition of a manufacturing work cell to promote monitoring, diagnostics, and prognostics
BA Weiss, G Qiao
International Manufacturing Science and Engineering Conference 50749 …, 2017
112017
Compact identity based encryption from LWE
D Apon, X Fan, F Liu
Cryptology ePrint Archive 2016, 2016
102016
Deniable attribute based encryption for branching programs from LWE
D Apon, X Fan, FH Liu
Theory of Cryptography Conference, 299-329, 2016
92016
NISTIR 8240 status report on the first round of the NIST post-quantum cryptography standardization process
G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, YK Liu, C Miller, ...
National Institute of Standards and Technology (NIST), US Department of …, 2019
72019
Constant-round group key exchange from the ring-LWE assumption
D Apon, D Dachman-Soled, H Gong, J Katz
International Conference on Post-Quantum Cryptography, 189-205, 2019
62019
An NP-complete problem in grid coloring, 2012
D Apon, W Gasarch, K Lawler
6
Vector Encoding over Lattices and Its Applications.
D Apon, X Fan, FH Liu
IACR Cryptol. ePrint Arch. 2017, 455, 2017
52017
Bi-Deniable Inner Product Encryption from LWE.
D Apon, X Fan, FH Liu
IACR Cryptol. ePrint Arch. 2015, 993, 2015
52015
Weak is Better: Tightly Secure Short Signatures from Weak PRFs.
J Alperin-Sheriff, D Apon
IACR Cryptol. ePrint Arch. 2017, 563, 2017
42017
Status report on the second round of the nist post-quantum cryptography standardization process
G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, J Kelsey, YK Liu, ...
NIST, Tech. Rep., July, 2020
32020
The system can't perform the operation now. Try again later.
Articles 1–20