Amit Deo

Orcid: 0000-0002-5192-4372

According to our database1, Amit Deo authored at least 15 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2025
Fully Asymmetric Anamorphic Homomorphic Encryption from LWE.
IACR Cryptol. ePrint Arch., 2025

Fast Homomorphic Evaluation of LWR-based PRFs.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

Pool: A Practical OT-based OPRF from Learning with Rounding.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

Anamorphic Signatures With Dictator and Recipient Unforgeability for Long Messages.
Proceedings of the Advances in Cryptology - ASIACRYPT 2025, 2025

2024
Homomorphic Evaluation of LWR-based PRFs and Application to Transciphering.
IACR Cryptol. ePrint Arch., 2024

Crypto Dark Matter on the Torus - Oblivious PRFs from Shallow PRFs and TFHE.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

2023
Crypto Dark Matter on the Torus: Oblivious PRFs from shallow PRFs and FHE.
IACR Cryptol. ePrint Arch., 2023

Robustly Reusable Fuzzy Extractors in a Post-quantum World.
Proceedings of the Applied Cryptography and Network Security, 2023

2021
Round-Optimal Verifiable Oblivious Pseudorandom Functions from Ideal Lattices.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

2020
Lattice-Based E-Cash, Revisited.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Strong Post-Compromise Secure Proxy Re-Encryption.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Cold Boot Attacks on Ring and Module LWE Keys Under the NTT.
IACR Cryptol. ePrint Arch., 2018

Estimate All the {LWE, NTRU} Schemes!
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

2017
Large Modulus Ring-LWE ≥ Module-LWE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Prescience: Probabilistic Guidance on the Retraining Conundrum for Malware Detection.
Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, 2016


  Loading...