Chris Peikert

Orcid: 0000-0003-0419-7501

Affiliations:
  • University of Michigan, Ann Arbor, MI, USA
  • Massachusetts Institute of Technology, Cambridge, MA, USA (former)


According to our database1, Chris Peikert authored at least 89 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Classical and Quantum Security of Elliptic Curve VRF, via Relative Indifferentiability.
IACR Cryptol. ePrint Arch., 2023

Cryptanalysis of Lattice-Based Sequentiality Assumptions and Proofs of Sequential Work.
IACR Cryptol. ePrint Arch., 2023

Functional Commitments for All Functions, with Transparent Setup and from SIS.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Hardness of the (Approximate) Shortest Vector Problem: A Simple Proof via Reed-Solomon Codes.
Proceedings of the Approximation, 2023

2022
Lattice (List) Decoding Near Minkowski's Inequality.
IEEE Trans. Inf. Theory, 2022

An Architecture to Accelerate Computation on Encrypted Data.
IEEE Micro, 2022

Functional Commitments for All Functions, with Transparent Setup.
IACR Cryptol. ePrint Arch., 2022

CraterLake: a hardware accelerator for efficient unbounded computation on encrypted data.
Proceedings of the ISCA '22: The 49th Annual International Symposium on Computer Architecture, New York, New York, USA, June 18, 2022

Improved Hardness of BDD and SVP Under Gap-(S)ETH.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

2021
Vector and Functional Commitments from Lattices.
IACR Cryptol. ePrint Arch., 2021

F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption (Extended Version).
CoRR, 2021

F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption.
Proceedings of the MICRO '21: 54th Annual IEEE/ACM International Symposium on Microarchitecture, 2021

2020
Improved Discrete Gaussian and Subgaussian Analysis for Lattice Cryptography.
IACR Cryptol. ePrint Arch., 2020

Constraining and Watermarking PRFs from Milder Assumptions.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Hardness of Bounded Distance Decoding on Lattices in ℓ<sub>p</sub> Norms.
Proceedings of the 35th Computational Complexity Conference, 2020

2019
Noninteractive Zero Knowledge for NP from (Plain) Learning With Errors.
IACR Cryptol. ePrint Arch., 2019

Algebraically Structured LWE, Revisited.
IACR Cryptol. ePrint Arch., 2019

He Gives C-Sieves on the CSIDH.
IACR Cryptol. ePrint Arch., 2019

Identifying Research Challenges in Post Quantum Cryptography Migration and Cryptographic Agility.
CoRR, 2019

Outsourcing Computation: The Minimal Refereed Mechanism.
Proceedings of the Web and Internet Economics - 15th International Conference, 2019

2018
More Efficient Commitments from Structured Lattice Assumptions.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

ALCHEMY: A Language and Compiler for Homomorphic Encryption Made easY.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Privately Constraining and Programming PRFs, the LWE Way.
IACR Cryptol. ePrint Arch., 2017

Pseudorandomness of Ring-LWE for Any Ring and Modulus.
IACR Cryptol. ePrint Arch., 2017

New (and Old) Proof Systems for Lattice Problems.
IACR Cryptol. ePrint Arch., 2017

List-Decoding Barnes-Wall Lattices.
Comput. Complex., 2017

2016
Multi-Key FHE from LWE, Revisited.
IACR Cryptol. ePrint Arch., 2016

How (Not) to Instantiate Ring-LWE.
IACR Cryptol. ePrint Arch., 2016

Challenges for Ring-LWE.
IACR Cryptol. ePrint Arch., 2016

On Adaptively Secure Multiparty Computation with a Short CRS.
IACR Cryptol. ePrint Arch., 2016

Efficient Commitments and Zero-Knowledge Protocols from Ring-SIS with Applications to Lattice-based Threshold Cryptosystems.
IACR Cryptol. ePrint Arch., 2016

Three's Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE.
IACR Cryptol. ePrint Arch., 2016

A Decade of Lattice Cryptography.
Found. Trends Theor. Comput. Sci., 2016

Λολ: Functional Lattice Cryptography.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs.
J. Cryptol., 2015

Λ ∘ λ: A Functional Library for Lattice Cryptography.
IACR Cryptol. ePrint Arch., 2015

Recovering Short Generators of Principal Ideals in Cyclotomic Rings.
IACR Cryptol. ePrint Arch., 2015

Key-Homomorphic Constrained Pseudorandom Functions.
IACR Cryptol. ePrint Arch., 2015

2014
Lattice Cryptography for the Internet.
IACR Cryptol. ePrint Arch., 2014

New and Improved Key-Homomorphic Pseudorandom Functions.
IACR Cryptol. ePrint Arch., 2014

Faster Bootstrapping with Polynomial Error.
IACR Cryptol. ePrint Arch., 2014

SPRING: Fast Pseudorandom Functions from Rounded Ring Products.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

2013
Special Section on the Forty-Second Annual ACM Symposium on Theory of Computing (STOC 2010).
SIAM J. Comput., 2013

Field switching in BGV-style homomorphic encryption.
J. Comput. Secur., 2013

On Ideal Lattices and Learning with Errors over Rings.
J. ACM, 2013

Hardness of SIS and LWE with Small Parameters.
IACR Cryptol. ePrint Arch., 2013

A Toolkit for Ring-LWE Cryptography.
IACR Cryptol. ePrint Arch., 2013

How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE.
IACR Cryptol. ePrint Arch., 2013

Practical Bootstrapping in Quasilinear Time.
IACR Cryptol. ePrint Arch., 2013

Classical hardness of learning with errors.
Proceedings of the Symposium on Theory of Computing Conference, 2013

On the Lattice Smoothing Parameter Problem.
Proceedings of the 28th Conference on Computational Complexity, 2013

2012
Bonsai Trees, or How to Delegate a Lattice Basis.
J. Cryptol., 2012

Ring Switching in BGV-Style Homomorphic Encryption.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Circular and KDM Security for Identity-Based Encryption.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

An update on SIPHER (Scalable Implementation of Primitives for Homomorphic EncRyption) - FPGA implementation using Simulink.
Proceedings of the IEEE Conference on High Performance Extreme Computing, 2012

2011
Generating Shorter Bases for Hard Random Lattices.
Theory Comput. Syst., 2011

Bi-Deniable Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2011

Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller.
IACR Cryptol. ePrint Arch., 2011

Identity-Based (Lossy) Trapdoor Functions and Applications.
IACR Cryptol. ePrint Arch., 2011

Pseudorandom Functions and Lattices.
IACR Cryptol. ePrint Arch., 2011

Enumerative Lattice Algorithms in any Norm Via M-ellipsoid Coverings.
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011

2010
Optimal Error Correction for Computationally Bounded Noise.
IEEE Trans. Inf. Theory, 2010

An Efficient and Parallel Gaussian Sampler for Lattices.
IACR Cryptol. ePrint Arch., 2010

Better Key Sizes (and Attacks) for LWE-Based Encryption.
IACR Cryptol. ePrint Arch., 2010

Enumerative Algorithms for the Shortest and Closest Lattice Vector Problems in Any Norm via M-Ellipsoid Coverings
CoRR, 2010

Public-Key Encryption Schemes with Auxiliary Inputs.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

Heuristics and Rigor in Lattice-Based Cryptography - (Invited Talk).
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

Robustness of the Learning with Errors Assumption.
Proceedings of the Innovations in Computer Science, 2010

2009
Bonsai Trees (or, Arboriculture in Lattice-Based Cryptography).
IACR Cryptol. ePrint Arch., 2009

Some Recent Progress in Lattice-Based Cryptography.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

Public-key cryptosystems from the worst-case shortest vector problem: extended abstract.
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009

Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems.
Proceedings of the Advances in Cryptology, 2009

2008
Public-Key Cryptosystems from the Worst-Case Shortest Vector Problem.
Electron. Colloquium Comput. Complex., 2008

Limits on the Hardness of Lattice Problems in <i>l</i><sub><i>p</i></sub> Norms.
Comput. Complex., 2008

SWIFFT: A Modest Proposal for FFT Hashing.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems.
Proceedings of the Advances in Cryptology, 2008

2007
A Framework for Efficient and Composable Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2007

Lossy Trapdoor Functions and Their Applications.
Electron. Colloquium Comput. Complex., 2007

Trapdoors for Hard Lattices and New Cryptographic Constructions.
Electron. Colloquium Comput. Complex., 2007

Limits on the Hardness of Lattice Problems in ell _p Norms.
Proceedings of the 22nd Annual IEEE Conference on Computational Complexity (CCC 2007), 2007

2006
Cryptographic error correction.
PhD thesis, 2006

Lattices that Admit Logarithmic Worst-Case to Average-Case Connection Factors.
Electron. Colloquium Comput. Complex., 2006

Limits on the Hardness of Lattice Problems in ℓ<sub>p</sub> Norms.
Electron. Colloquium Comput. Complex., 2006

2005
On Error Correction in the Exponent.
IACR Cryptol. ePrint Arch., 2005

Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices
Electron. Colloquium Comput. Complex., 2005

Optimal Error Correction Against Computationally Bounded Noise.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005

2004
Completely fair SFE and coalition-safe cheap talk.
Proceedings of the Twenty-Third Annual ACM Symposium on Principles of Distributed Computing, 2004

2003
Lower bounds for collusion-secure fingerprinting.
Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete Algorithms, 2003

2001
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes.
Proceedings of the Advances in Cryptology, 2001


  Loading...