Aayush Jain

Orcid: 0009-0001-7138-2777

According to our database1, Aayush Jain authored at least 67 papers between 2013 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Lossy Cryptography from Code-Based Assumptions Dense-Sparse LPN: A New Subexponentially Hard LPN Variant in SZK.
J. Cryptol., October, 2025

Quantum Advantage via Solving Multivariate Polynomials.
CoRR, September, 2025

The Quasi-Polynomial Low-Degree Conjecture is False.
CoRR, May, 2025

Lattice-Based Post-Quantum iO from Circular Security with Random Opening Assumption (Part II: zeroizing attacks against private-coin evasive LWE assumptions).
IACR Cryptol. ePrint Arch., 2025

Using the Planted Clique Conjecture for Cryptography: Public-Key Encryption from Planted Clique and Noisy k-LIN over Expanders.
Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025

A New Approach for LPN-Based Pseudorandom Functions: Low-Depth and Key-Homomorphic.
Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025

Post-quantum PKE from Unstructured Noisy Linear Algebraic Assumptions: Beyond LWE and Alekhnovich's LPN.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Quantum Key Leasing for PKE and FHE with a Classical Lessor.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Lattice-Based Post-quantum iO from Circular Security with Random Opening Assumption.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
A survey on 3D object detection in real time for autonomous driving.
Frontiers Robotics AI, 2024

Privacy-Preserving Password-Based Authentication Using Zero-Knowledge Proofs.
Proceedings of the IEEE Region 10 Conference, 2024

Barrier Functions Inspired Reward Shaping for Reinforcement Learning.
Proceedings of the IEEE International Conference on Robotics and Automation, 2024

CoBT: Collaborative Programming of Behaviour Trees from One Demonstration for Robot Manipulation.
Proceedings of the IEEE International Conference on Robotics and Automation, 2024

Fast White-Box Adversarial Streaming Without a Random Oracle.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

How to Simulate Random Oracles with Auxiliary Input.
Proceedings of the 65th IEEE Annual Symposium on Foundations of Computer Science, 2024

A Systematic Study of Sparse LWE.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Non-interactive Zero-Knowledge from LPN and MQ.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Lossy Cryptography from Code-Based Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Hyperspectral Domain Adaptation for the Detection of Material Types in Recycling Streams at the Example of Electrolyzers.
Proceedings of the IEEE International Geoscience and Remote Sensing Symposium, 2023

Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-quantum i풪.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Maliciously-Secure MrNISC in the Plain Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

The Pseudorandom Oracle Model and Ideal Obfuscation.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Computational Wiretap Coding from Indistinguishability Obfuscation.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Multi-party Homomorphic Secret Sharing and Sublinear MPC from Sparse LPN.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
[Reproducibility Report] Path Planning using Neural A* Search.
CoRR, 2022

Indistinguishability Obfuscation from LPN over $\mathbb {F}_p$, DLIN, and PRGs in NC<sup>0</sup>.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2021
Indistinguishability Obfuscation from Well-Studied Assumptions.
PhD thesis, 2021

Indistinguishability Obfuscation from LPN over F_p, DLIN, and PRGs in NC^0.
IACR Cryptol. ePrint Arch., 2021

A Note on the Pseudorandomness of Low-Degree Polynomials over the Integers.
IACR Cryptol. ePrint Arch., 2021

Deep Learning based Differential Distinguisher for Lightweight Block Ciphers.
CoRR, 2021

Indistinguishability obfuscation from well-founded assumptions.
Proceedings of the STOC '21: 53rd Annual ACM SIGACT Symposium on Theory of Computing, 2021

Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Multiparty Reusable Non-interactive Secure Computation from LWE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Counterexamples to New Circular Security Assumptions Underlying iO.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Deep Learning based Differential Distinguisher for Lightweight Cipher PRESENT.
IACR Cryptol. ePrint Arch., 2020

Performance analysis of non-banking finance companies using two-stage data envelopment analysis.
Ann. Oper. Res., 2020

SeekSuspect: retrieving suspects from criminal datasets using visual memory.
Proceedings of the MMAsia 2020: ACM Multimedia Asia, 2020

Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption.
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020

Combiners for Functional Encryption, Unconditionally.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Statistical ZAP Arguments.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Amplifying the Security of Functional Encryption, Unconditionally.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Secure MPC: Laziness Leads to GOD.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Simplifying Constructions and Assumptions for i풪.
IACR Cryptol. ePrint Arch., 2019

How to leverage hardness of constant degree expanding polynomials over R to build iO.
IACR Cryptol. ePrint Arch., 2019

From FE Combiners to Secure MPC and Back.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

How to Leverage Hardness of Constant-Degree Expanding Polynomials over \mathbb R R to build i풪 i O.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Sum-of-Squares Meets Program Obfuscation, Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Simultaneous Amplification: The Case of Non-interactive Zero-Knowledge.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
How to leverage hardness of constant-degree expanding polynomials over ℝ to build iO.
IACR Cryptol. ePrint Arch., 2018

Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness.
IACR Cryptol. ePrint Arch., 2018

Non-trivial Witness Encryption and Null-iO from Standard Assumptions.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Threshold Cryptosystems from Threshold Fully Homomorphic Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Adaptive latent fingerprint segmentation using feature selection and random decision forest classification.
Inf. Fusion, 2017

Threshold Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2017

A note on VRFs from Verifiable Functional Encryption.
IACR Cryptol. ePrint Arch., 2017

Hierarchical Functional Encryption.
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017

Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

2016
Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security.
IACR Cryptol. ePrint Arch., 2016

Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Multi-input Functional Encryption with Unbounded-Message Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Verifiable Functional Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Witness Signatures and Non-Malleable Multi-Prover Zero-Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2015

Functional Encryption: Decentralised and Delegatable.
IACR Cryptol. ePrint Arch., 2015

2014
Exploring Tangible Interactions for Capturing Self Photographs.
Proceedings of the 6th Indian Conference on Human Computer Interaction, 2014

2013
On FHE without bootstrapping.
IACR Cryptol. ePrint Arch., 2013


  Loading...