Chris Peikert
Orcid: 0000-0003-0419-7501Affiliations:
- University of Michigan, Ann Arbor, MI, USA
- Massachusetts Institute of Technology, Cambridge, MA, USA (former)
According to our database1,
Chris Peikert
authored at least 93 papers
between 2001 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on twitter.com
-
on orcid.org
-
on github.com
On csauthors.net:
Bibliography
2025
CoRR, October, 2025
IACR Cryptol. ePrint Arch., 2025
IACR Commun. Cryptol., 2025
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025
2024
Cryptanalysis of Lattice-Based Sequentiality Assumptions and Proofs of Sequential Work.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Classical and Quantum Security of Elliptic Curve VRF, via Relative Indifferentiability.
Proceedings of the Topics in Cryptology - CT-RSA 2023, 2023
Hardness of the (Approximate) Shortest Vector Problem: A Simple Proof via Reed-Solomon Codes.
Proceedings of the Approximation, 2023
2022
IACR Cryptol. ePrint Arch., 2022
CraterLake: a hardware accelerator for efficient unbounded computation on encrypted data.
Proceedings of the ISCA '22: The 49th Annual International Symposium on Computer Architecture, New York, New York, USA, June 18, 2022
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022
2021
F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption (Extended Version).
CoRR, 2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Proceedings of the MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture, 2021
2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the 35th Computational Complexity Conference, 2020
2019
Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility.
CoRR, 2019
Proceedings of the Web and Internet Economics - 15th International Conference, 2019
Proceedings of the Theory of Cryptography - 17th International Conference, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, 2017
2016
Efficient Commitments and Zero-Knowledge Protocols from Ring-SIS with Applications to Lattice-based Threshold Cryptosystems.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs.
J. Cryptol., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
2014
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
Special Section on the Forty-Second Annual ACM Symposium on Theory of Computing (STOC 2010).
SIAM J. Comput., 2013
Proceedings of the Symposium on Theory of Computing Conference, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the 28th Conference on Computational Complexity, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
An update on SIPHER (Scalable Implementation of Primitives for Homomorphic EncRyption) - FPGA implementation using Simulink.
Proceedings of the IEEE Conference on High Performance Extreme Computing, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the 27th Conference on Computational Complexity, 2012
2011
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
2010
IEEE Trans. Inf. Theory, 2010
Enumerative Algorithms for the Shortest and Closest Lattice Vector Problems in Any Norm via M-Ellipsoid Coverings
CoRR, 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the Innovations in Computer Science, 2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the Advances in Cryptology, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Public-key cryptosystems from the worst-case shortest vector problem: extended abstract.
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009
Proceedings of the 26th International Symposium on Theoretical Aspects of Computer Science, 2009
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems.
Proceedings of the Advances in Cryptology, 2009
2008
Comput. Complex., 2008
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Proceedings of the Theoretical Foundations of Practical Information Security, 30.11., 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the 39th Annual ACM Symposium on Theory of Computing, 2007
Proceedings of the 22nd Annual IEEE Conference on Computational Complexity (CCC 2007), 2007
2006
Electron. Colloquium Comput. Complex., 2006
Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices.
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
2005
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
2004
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004
2003
Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2003
2001
Proceedings of the Advances in Cryptology, 2001