Cody Freitag

Orcid: 0000-0002-6307-204X

Affiliations:
  • Cornell University, NY, USA


According to our database1, Cody Freitag authored at least 22 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Seedless Condensers for Efficiently Samplable Sources.
IACR Cryptol. ePrint Arch., 2025

Unambiguous SNARGs for P from LWE with Applications to PPAD Hardness.
Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025

2024
Public-Coin, Complexity-Preserving, Succinct Arguments of Knowledge for NP from Collision-Resistance.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

2023
Optimal Security for Keyed Hash Functions: Avoiding Time-Space Tradeoffs for Finding Collisions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

How to Use (Plain) Witness Encryption: Registered ABE, Flexible Broadcast, and More.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

The Cost of Statistical Security in Proofs for Repeated Squaring.
Proceedings of the 4th Conference on Information-Theoretic Cryptography, 2023

Riggs: Decentralized Sealed-Bid Auctions.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
The Cost of Statistical Security in Interactive Proofs for Repeated Squaring.
IACR Cryptol. ePrint Arch., 2022

Cosmic Security.
IACR Cryptol. ePrint Arch., 2022

Parallelizable Delegation from LWE.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Universal Reductions: Reductions Relative to Stateful Oracles.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Time-Space Tradeoffs for Sponge Hashing: Attacks and Limitations for Short Collisions.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
Inference Under Information Constraints III: Local Privacy Constraints.
IEEE J. Sel. Areas Inf. Theory, 2021

Non-malleable Time-Lock Puzzles and Applications.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

2020
Impossibility of Strong KDM Security with Auxiliary Input.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Continuous Verifiable Delay Functions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

SPARKs: Succinct Parallelizable Arguments of Knowledge.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
Non-Uniformly Sound Certificates with Applications to Concurrent Zero-Knowledge.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Test without Trust: Optimal Locally Private Distribution Testing.
Proceedings of the 22nd International Conference on Artificial Intelligence and Statistics, 2019

2017
Symmetric-Key Broadcast Encryption: The Multi-sender Case.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2017

Testing Hereditary Properties of Sequences.
Proceedings of the Approximation, 2017

Signature Schemes with Randomized Verification.
Proceedings of the Applied Cryptography and Network Security, 2017


  Loading...