Follow
Sanjam Garg
Title
Cited by
Cited by
Year
Candidate indistinguishability obfuscation and functional encryption for all circuits
S Garg, C Gentry, S Halevi, M Raykova, A Sahai, B Waters
SIAM Journal on Computing 45 (3), 882-929, 2016
14292016
Candidate multilinear maps from ideal lattices
S Garg, C Gentry, S Halevi
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
8512013
Witness encryption and its applications
S Garg, C Gentry, A Sahai, B Waters
Proceedings of the forty-fifth annual ACM symposium on Theory of computing …, 2013
3282013
Attribute-Based Encryption for Circuits from Multilinear Maps.
S Garg, C Gentry, S Halevi, A Sahai, B Waters
Advances in Cryptology–CRYPTO 2013 2013, 2013
3282013
Protecting obfuscation against algebraic attacks
B Barak, S Garg, YT Kalai, O Paneth, A Sahai
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
2802014
Two-round secure MPC from indistinguishability obfuscation
S Garg, C Gentry, S Halevi, M Raykova
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014 …, 2014
1852014
TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption
S Garg, P Mohassel, C Papamanthou
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
1532016
Identity-based Encryption from the Diffie-Hellman Assumption
N Döttling, S Garg
Journal of the ACM (JACM) 68 (3), 1-46, 2021
152*2021
Differing-inputs obfuscation and applications
P Ananth, D Boneh, S Garg, A Sahai, M Zhandry
Cryptology ePrint Archive, 2013
1502013
Succinct randomized encodings and their applications
N Bitansky, S Garg, H Lin, R Pass, S Telang
Proceedings of the forty-seventh annual ACM symposium on Theory of Computing …, 2015
1322015
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input.
S Garg, C Gentry, S Halevi, D Wichs
Advances in Cryptology – CRYPTO 2014, 518-535, 2013
131*2013
Two-round multiparty secure computation from minimal assumptions
S Garg, A Srinivasan
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
1222018
Functional encryption without obfuscation
S Garg, C Gentry, S Halevi, M Zhandry
Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2016
1082016
Unified architecture for large-scale attested metering
M LeMay, G Gross, CA Gunter, S Garg
2007 40th Annual Hawaii International Conference on System Sciences (HICSS …, 2007
1072007
Revisiting the cryptographic hardness of finding a nash equilibrium
S Garg, O Pandey, A Srinivasan
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
102*2016
Building efficient fully collusion-resilient traitor tracing and revocation schemes
S Garg, A Kumarasubramanian, A Sahai, B Waters
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1002010
Secure Obfuscation in a Weak Multilinear Map Model
S Garg, E Miles, P Mukherjee, A Sahai, A Srinivasan, M Zhandry
Theory of Cryptography Conference 2016, 0
95*
Leakage-resilient zero knowledge
S Garg, A Jain, A Sahai
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
842011
The exact round complexity of secure computation
S Garg, P Mukherjee, O Pandey, A Polychroniadou
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
812016
Fully Secure Functional Encryption without Obfuscation.
S Garg, C Gentry, S Halevi, M Zhandry
IACR Cryptol. ePrint Arch. 2014, 666, 2014
802014
The system can't perform the operation now. Try again later.
Articles 1–20