Zvika Brakerski
Orcid: 0000-0002-4867-7999
According to our database1,
Zvika Brakerski
authored at least 110 papers
between 2002 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on d-nb.info
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 2024
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023
Proceedings of the 14th Innovations in Theoretical Computer Science Conference, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
2022
Proceedings of the STOC '22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20, 2022
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022
Proceedings of the 49th International Colloquium on Automata, Languages, and Programming, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
Proceedings of the 15th Conference on the Theory of Quantum Computation, 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Witness Indistinguishability for Any Single-Round Argument with Applications to Access Control.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Proceedings of the 11th Innovations in Theoretical Computer Science Conference, 2020
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
Proceedings of the Theory of Cryptography - 17th International Conference, 2019
Leveraging Linear Decryption: Rate-1 Fully-Homomorphic Encryption and Time-Lock Puzzles.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
Proceedings of the Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Electron. Colloquium Comput. Complex., 2018
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018
A Cryptographic Test of Quantumness and Certifiable Randomness from a Single Quantum Device.
Proceedings of the 59th IEEE Annual Symposium on Foundations of Computer Science, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Limits on Low-Degree Pseudorandom Generators (Or: Sum-of-Squares Meets Program Obfuscation).
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
2017
Proceedings of the Theory of Cryptography - 15th International Conference, 2017
Proceedings of the Theory of Cryptography - 15th International Conference, 2017
Non-interactive delegation and batch NP verification from standard computational assumptions.
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
Electron. Colloquium Comput. Complex., 2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the 2016 ACM Conference on Innovations in Theoretical Computer Science, 2016
Multi-input Functional Encryption in the Private-Key Setting: Stronger Security from Weaker Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions - Or: How to Secretly Embed a Circuit in Your PRF.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
SIAM J. Comput., 2014
The Trojan Method in Functional Encryption: From Selective to Adaptive Security, Generically.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the Innovations in Theoretical Computer Science, 2014
Proceedings of the Innovations in Theoretical Computer Science, 2014
2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Symposium on Theory of Computing Conference, 2013
Proceedings of the Twenty-Fourth Annual ACM-SIAM Symposium on Discrete Algorithms, 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Innovations in Theoretical Computer Science 2012, 2012
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
2011
Electron. Colloquium Comput. Complex., 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
Better Security for Deterministic Public-Key Encryption: The Auxiliary-Input Setting.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
Proceedings of the Studies in Complexity and Cryptography. Miscellanea on the Interplay between Randomness and Computation, 2011
2010
A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model.
IACR Cryptol. ePrint Arch., 2010
Overcoming the Hole in the Bucket: Public-Key Cryptography Resilient to Continual Memory Leakage.
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010
Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability - (or: Quadratic Residuosity Strikes Back).
Proceedings of the Advances in Cryptology, 2010
2009
Electron. Colloquium Comput. Complex., 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the 28th Annual ACM Symposium on Principles of Distributed Computing, 2009
Proceedings of the Advances in Cryptology, 2009
2004
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004
2003
2002
Proceedings of the Twenty-First Annual ACM Symposium on Principles of Distributed Computing, 2002