Willy Quach

Orcid: 0000-0002-4309-6992

According to our database1, Willy Quach authored at least 21 papers between 2015 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Unique NIZKs and Steganography Detection.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

2024
On Bounded Storage Key Agreement and One-Way Functions.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

2023
Lower Bounds on Anonymous Whistleblowing.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

A Note on Non-interactive Zero-Knowledge from CDH.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
Post-quantum Insecurity from LWE.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Authentication in the Bounded Storage Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2021
Succinct LWE Sampling, Random Polynomials, and Obfuscation.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Targeted Lossy Functions and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Does Fiat-Shamir Require a Cryptographic Hash Function?
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
UC-Secure OT from LWE, Revisited.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

A Makespan Lower Bound for the Tiled Cholesky Factorization Based on ALAP Schedule.
Proceedings of the Euro-Par 2020: Parallel Processing, 2020

Leakage-Resilient Key Exchange and Two-Seed Extractors.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2019

Reusable Designated-Verifier NIZKs for all NP from CDH.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

New Constructions of Reusable Designated-Verifier NIZKs.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Broadcast and Trace with N^ε Ciphertext Size from Standard Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Watermarking PRFs Under Standard Assumptions: Public Marking and Security with Extraction Queries.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Hash Proof Systems over Lattices Revisited.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Laconic Function Evaluation and Applications.
Proceedings of the 59th IEEE Annual Symposium on Foundations of Computer Science, 2018

2015
A Makespan Lower Bound for the Scheduling of the Tiled Cholesky Factorization based on ALAP scheduling.
CoRR, 2015


  Loading...