Fermi Ma

According to our database1, Fermi Ma authored at least 26 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A one-query lower bound for unitary synthesis and breaking quantum cryptography.
IACR Cryptol. ePrint Arch., 2023

2022
Succinct Classical Verification of Quantum Computation.
IACR Cryptol. ePrint Arch., 2022

Commitments to Quantum States.
Electron. Colloquium Comput. Complex., 2022

2021
On the Security of Doubly Efficient PIR.
IACR Cryptol. ePrint Arch., 2021

Post-Quantum Zero Knowledge, Revisited (or: How to Do Quantum Rewinding Undetectably).
Electron. Colloquium Comput. Complex., 2021

Post-Quantum Succinct Arguments.
Electron. Colloquium Comput. Complex., 2021

Post-Quantum Succinct Arguments: Breaking the Quantum Rewinding Barrier.
Proceedings of the 62nd IEEE Annual Symposium on Foundations of Computer Science, 2021

On the Round Complexity of Secure Quantum Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Leakage-Resilient Key Exchange and Two-Seed Extractors.
IACR Cryptol. ePrint Arch., 2020

Does Fiat-Shamir Require a Cryptographic Hash Function?
IACR Cryptol. ePrint Arch., 2020

Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption.
IACR Cryptol. ePrint Arch., 2020

One-Way Functions Imply Secure Computation in a Quantum World.
IACR Cryptol. ePrint Arch., 2020

On The Round Complexity of Two-Party Quantum Computation.
IACR Cryptol. ePrint Arch., 2020

2019
The Distinction Between Fixed and Random Generators in Group-Based Assumptions.
IACR Cryptol. ePrint Arch., 2019

Public-Key Function-Private Hidden Vector Encryption (and More).
IACR Cryptol. ePrint Arch., 2019

On the (In)security of Kilian-Based SNARGs.
IACR Cryptol. ePrint Arch., 2019

2018
The fewest clues problem.
Theor. Comput. Sci., 2018

New Techniques for Obfuscating Conjunctions.
IACR Cryptol. ePrint Arch., 2018

Preventing Zeroizing Attacks on GGH15.
IACR Cryptol. ePrint Arch., 2018

The MMap Strikes Back: Obfuscation and New Multilinear Maps Immune to CLT13 Zeroizing Attacks.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Return of GGH15: Provable Security Against Zeroizing Attacks.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

2017
Arboral satisfaction: Recognition and LP approximation.
Inf. Process. Lett., 2017

New Multilinear Maps from CLT13 with Provable Security Against Zeroizing Attacks.
IACR Cryptol. ePrint Arch., 2017

Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption.
IACR Cryptol. ePrint Arch., 2017

2015
You Should Be Scared of German Ghost.
J. Inf. Process., 2015

2014
Playing Dominoes Is Hard, Except by Yourself.
Proceedings of the Fun with Algorithms - 7th International Conference, 2014


  Loading...