Indistinguishability obfuscation for turing machines with unbounded memory V Koppula, AB Lewko, B Waters Proceedings of the forty-seventh annual ACM symposium on Theory of Computing …, 2015 | 165 | 2015 |
Lockable obfuscation R Goyal, V Koppula, B Waters 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS …, 2017 | 150 | 2017 |
A generic approach to constructing and proving verifiable random functions R Goyal, S Hohenberger, V Koppula, B Waters Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017 | 70 | 2017 |
Adaptively secure puncturable pseudorandom functions in the standard model S Hohenberger, V Koppula, B Waters International conference on the theory and application of cryptology and …, 2015 | 66 | 2015 |
Collusion resistant traitor tracing from learning with errors R Goyal, V Koppula, B Waters Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing …, 2018 | 64 | 2018 |
Functional encryption for randomized functionalities V Goyal, A Jain, V Koppula, A Sahai Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015 | 62 | 2015 |
Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption V Koppula, B Waters Annual international cryptology conference, 671-700, 2019 | 60 | 2019 |
Universal signature aggregators S Hohenberger, V Koppula, B Waters Annual international conference on the theory and applications of …, 2015 | 57 | 2015 |
Simpler proofs of quantumness Z Brakerski, V Koppula, U Vazirani, T Vidick arXiv preprint arXiv:2005.04826, 2020 | 54 | 2020 |
Semi-adaptive security and bundling functionalities made generic and easy R Goyal, V Koppula, B Waters Theory of Cryptography Conference, 361-388, 2016 | 48 | 2016 |
NIZK from LPN and trapdoor hash via correlation intractability for approximable relations Z Brakerski, V Koppula, T Mour Annual International Cryptology Conference, 738-767, 2020 | 43 | 2020 |
Adaptively secure constrained pseudorandom functions D Hofheinz, A Kamath, V Koppula, B Waters International Conference on Financial Cryptography and Data Security, 357-376, 2019 | 43 | 2019 |
Separations in circular security for arbitrary length key cycles V Koppula, K Ramchen, B Waters Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015 | 41 | 2015 |
Separating semantic and circular security for symmetric-key bit encryption from the learning with errors assumption R Goyal, V Koppula, B Waters Annual International Conference on the Theory and Applications of …, 2017 | 32 | 2017 |
New approaches to traitor tracing with embedded identities R Goyal, V Koppula, B Waters Theory of Cryptography Conference, 149-179, 2019 | 27 | 2019 |
Constrained pseudorandom functions for unconstrained inputs A Deshpande, V Koppula, B Waters Annual International Conference on the Theory and Applications of …, 2016 | 26 | 2016 |
Circular security separations for arbitrary length cycles from LWE V Koppula, B Waters Annual International Cryptology Conference, 681-700, 2016 | 23 | 2016 |
Risky traitor tracing and new differential privacy negative results R Goyal, V Koppula, A Russell, B Waters Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 18 | 2018 |
Deterministic public-key encryption under continual leakage V Koppula, O Pandey, Y Rouselakis, B Waters Applied Cryptography and Network Security: 14th International Conference …, 2016 | 17 | 2016 |
Separating IND-CPA and circular security for unbounded length key cycles R Goyal, V Koppula, B Waters IACR International Workshop on Public Key Cryptography, 232-246, 2017 | 16 | 2017 |