Noah Stephens-Davidowitz

According to our database1, Noah Stephens-Davidowitz authored at least 49 papers between 2014 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Difficulties Constructing Lattices With Exponential Kissing Number From Codes.
IEEE Trans. Inf. Theory, 2025

Recursive lattice reduction - A framework for finding short lattice vectors.
Proceedings of the 2025 Symposium on Simplicity in Algorithms, 2025

The More the Merrier! On Total Coding and Lattice Problems and the Complexity of Finding Multicollisions.
Proceedings of the 16th Innovations in Theoretical Computer Science Conference, 2025

Guarding the Signal: Secure Messaging with Reverse Firewalls.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
The more the merrier! On the complexity of finding multicollisions, with connections to codes and lattices.
Electron. Colloquium Comput. Complex., 2024

More Basis Reduction for Linear Codes: Backward Reduction, BKZ, Slide Reduction, and More.
Proceedings of the Approximation, 2024

2023
On the randomized complexity of range avoidance, with applications to cryptography and metacomplexity.
Electron. Colloquium Comput. Complex., 2023

Lattice Problems beyond Polynomial Time.
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023

Just How Hard Are Rotations of $\mathbb {Z}^n$? Algorithms and Cryptography with the Simplest Lattice.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Revisiting Time-Space Tradeoffs for Function Inversion.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

The (Im)possibility of Simple Search-To-Decision Reductions for Approximation Problems.
Proceedings of the Approximation, 2023

2022
On Seedless PRNGs and Premature Next.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

2021
No Time to Hash: On Superefficient Entropy Accumulation.
IACR Cryptol. ePrint Arch., 2021

Just how hard are rotations of ℤ<sup>n</sup>? Algorithms and cryptography with the simplest lattice.
IACR Cryptol. ePrint Arch., 2021

On the (im)possibility of branch-and-bound search-to-decision reductions for approximate optimization.
Electron. Colloquium Comput. Complex., 2021

Dimension-Preserving Reductions Between SVP and CVP in Different p-Norms.
CoRR, 2021

Dimension-Preserving Reductions Between SVP and CVP in Different <i>p</i>-Norms.
Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, 2021

Fine-grained hardness of CVP(P) - Everything that we can prove (and nothing else).
Proceedings of the 2021 ACM-SIAM Symposium on Discrete Algorithms, 2021

A 2<sup>n/2</sup>-Time Algorithm for $\sqrt{n}$-SVP and $\sqrt{n}$-Hermite SVP, and an Improved Time-Approximation Tradeoff for (H)SVP.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

No Time to Hash: On Super-Efficient Entropy Accumulation.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Online Linear Extractors for Independent Sources.
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021

On the Hardness of Average-Case k-SUM.
Proceedings of the Approximation, 2021

2020
A 2<sup>n/2</sup>-Time Algorithm for √n-SVP and √n-Hermite SVP, and an Improved Time-Approximation Tradeoff for (H)SVP.
CoRR, 2020

Lattice Reduction for Modules, or How to Reduce ModuleSVP to ModuleSVP.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Slide Reduction, Revisited - Filling the Gaps in SVP Approximation.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Extractor Lower Bounds, Revisited.
Proceedings of the Approximation, 2020

2019
Kissing Numbers and Transference Theorems from Generalized Tail Bounds.
SIAM J. Discret. Math., 2019

SETH-Hardness of Coding Problems.
Proceedings of the 60th IEEE Annual Symposium on Foundations of Computer Science, 2019

A Time-Distance Trade-Off for GDD with Preprocessing - Instantiating the DLW Heuristic.
Proceedings of the 34th Computational Complexity Conference, 2019

2018
Generalizations of Banaszczyk's transference theorems and tail bound.
IACR Cryptol. ePrint Arch., 2018

(Gap/S)ETH hardness of SVP.
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, 2018

Just Take the Average! An Embarrassingly Simple 2^n-Time Algorithm for SVP (and CVP).
Proceedings of the 1st Symposium on Simplicity in Algorithms, 2018

New (and Old) Proof Systems for Lattice Problems.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

2017
On the Gaussian Measure Over Lattices.
PhD thesis, 2017

An Inequality for Gaussians on Lattices.
SIAM J. Discret. Math., 2017

Pseudorandomness of ring-LWE for any ring and modulus.
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, 2017

A reverse Minkowski theorem.
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, 2017

On the Quantitative Hardness of CVP.
Proceedings of the 58th IEEE Annual Symposium on Foundations of Computer Science, 2017

Implementing BP-Obfuscation Using Graph-Induced Encoding.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Discrete Gaussian Sampling Reduces to CVP and SVP.
Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, 2016

On the Lattice Distortion Problem.
Proceedings of the 24th Annual European Symposium on Algorithms, 2016

Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Search-to-Decision Reductions for Lattice Problems with Approximation Factors (Slightly) Greater Than One.
Proceedings of the Approximation, 2016

2015
Solving the Shortest Vector Problem in 2<sup>n</sup> Time Using Discrete Gaussian Sampling: Extended Abstract.
Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, 2015

Solving the Closest Vector Problem in 2^n Time - The Discrete Gaussian Strikes Again!
Proceedings of the IEEE 56th Annual Symposium on Foundations of Computer Science, 2015

Cryptographic Reverse Firewalls.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
Solving the Shortest Vector Problem in $2^n$ Time via Discrete Gaussian Sampling.
CoRR, 2014

How to Eat Your Entropy and Have It Too - Optimal Recovery Strategies for Compromised RNGs.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

On the Closest Vector Problem with a Distance Guarantee.
Proceedings of the IEEE 29th Conference on Computational Complexity, 2014


  Loading...