Craig Gentry
Orcid: 0009-0000-6651-7262Affiliations:
- IBM Thomas J. Watson Research Center, Yorktown Heights, NY, USA
According to our database1,
Craig Gentry
authored at least 109 papers
between 2001 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
Resource Estimation of CGGI and CKKS scheme workloads on FracTLcore Computing Fabric.
CoRR, October, 2025
2024
STOP-HCV-HCC Program: Privacy-Preserving Innovation for Remote Data Access Analytics at Federally Qualified Health Centers in South Texas.
Proceedings of the Digital Health and Informatics Innovations for Sustainable Health Care Systems, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
2019
Proceedings of the Theory of Cryptography - 17th International Conference, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2018
2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
2016
Commun. ACM, 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
2015
Using Fully Homomorphic Hybrid Encryption to Minimize Non-interative Zero-Knowledge Proofs.
J. Cryptol., 2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption.
Proceedings of the IEEE 56th Annual Symposium on Foundations of Computer Science, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Electron. Colloquium Comput. Complex., 2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the 55th IEEE Annual Symposium on Foundations of Computer Science, 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Noncommutative Determinant is Hard: A Simple Proof Using an Extension of Barrington's Theorem.
Proceedings of the IEEE 29th Conference on Computational Complexity, 2014
2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Symposium on Theory of Computing Conference, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits.
Proceedings of the 54th Annual IEEE Symposium on Foundations of Computer Science, 2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the Advances in Cryptology, 2013
Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Innovations in Theoretical Computer Science 2012, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
2011
Electron. Colloquium Comput. Complex., 2011
Proceedings of the 43rd ACM Symposium on Theory of Computing, 2011
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
2010
The Geometry of Provable Security: Some Proofs of Security in Which Lattices Make a Surprise Appearance.
Proceedings of the LLL Algorithm - Survey and Applications, 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the Advances in Cryptology, 2010
Proceedings of the Advances in Cryptology, 2010
Proceedings of the Advances in Cryptology, 2010
2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the 41st Annual ACM Symposium on Theory of Computing, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
ACM Trans. Inf. Syst. Secur., 2008
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008
2007
Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, 2007
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
Proceedings of the Public Key Cryptography, 2006
IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures.
Proceedings of the Advances in Information and Computer Security, 2006
Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science, 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
Proceedings of the Advances in Cryptology, 2006
2005
End-to-end security in the presence of intelligent data adapting proxies: the case of authenticating transcoded streaming media.
IEEE J. Sel. Areas Commun., 2005
Proceedings of the Proceedings 6th ACM Conference on Electronic Commerce (EC-2005), 2005
Proceedings of the Automata, Languages and Programming, 32nd International Colloquium, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
Efficient Designated Confirmer Signatures Without Random Oracles or General Zero-Knowledge Proofs.
Proceedings of the Advances in Cryptology, 2005
2004
Wirel. Pers. Commun., 2004
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Information Security, 7th International Conference, 2004
Proceedings of the Financial Cryptography, 2004
Proceedings of the Advances in Cryptology, 2004
Proceedings of the Communications and Multimedia Security, 2004
Proceedings of the Advances in Cryptology, 2004
2003
Proceedings of the Advances in Cryptology, 2003
Proceedings of the Advances in Cryptology, 2003
2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
2001
Proceedings of the Advances in Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001