Skip to main content

and
  1. No Access

    Article

    The Complexity of Grid Coloring

    A c-coloring of the grid GN,M = [N] × [M] is a map** of GN,M into [c] such that no four corners forming a rectangle have the same color. In 2009 a challenge was proposed to find a 4-coloring of G17,17. Though a...

    Daniel Apon, William Gasarch, Kevin Lawler in Theory of Computing Systems (2023)

  2. No Access

    Chapter and Conference Paper

    Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model

    We give the first constructions in the plain model of 1) nonmalleable digital lockers (Canetti and Varia, TCC 2009) and 2) robust fuzzy extractors (Boyen et al., Eurocrypt 2005) that secure sources with entrop...

    Daniel Apon, Chloe Cachet, Benjamin Fuller in Advances in Cryptology – ASIACRYPT 2022 (2022)

  3. No Access

    Chapter and Conference Paper

    SoK: How (not) to Design and Implement Post-quantum Cryptography

    Post-quantum cryptography has known a Cambrian explosion in the last decade. What started as a very theoretical and mathematical area has now evolved into a sprawling research field, complete with side-channel...

    James Howe, Thomas Prest, Daniel Apon in Topics in Cryptology – CT-RSA 2021 (2021)

  4. No Access

    Chapter and Conference Paper

    Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme

    In 2013, Tao et al. introduced the ABC Simple Matrix Scheme for Encryption, a multivariate public key encryption scheme. The scheme boasts great efficiency in encryption and decryption, though it suffers from...

    Daniel Apon, Dustin Moody, Ray Perlner, Daniel Smith-Tone in Post-Quantum Cryptography (2020)

  5. Chapter and Conference Paper

    Cryptanalysis of LEDAcrypt

    We report on the concrete cryptanalysis of LEDAcrypt, a 2nd Round candidate in NIST’s Post-Quantum Cryptography standardization process and one of 17 encryption schemes that remain as candidates for near-term ...

    Daniel Apon, Ray Perlner, Angela Robinson in Advances in Cryptology – CRYPTO 2020 (2020)

  6. No Access

    Chapter and Conference Paper

    Constant-Round Group Key Exchange from the Ring-LWE Assumption

    Group key-exchange protocols allow a set of N parties to agree on a shared, secret key by communicating over a public network

    Daniel Apon, Dana Dachman-Soled, Hui**g Gong, Jonathan Katz in Post-Quantum Cryptography (2019)

  7. No Access

    Chapter and Conference Paper

    Efficient, Reusable Fuzzy Extractors from LWE

    A fuzzy extractor (FE) enables reproducible generation of high-quality randomness from noisy inputs having sufficient min-entropy. FEs have been proposed for deriving cryptographic keys from biometric data. FE...

    Daniel Apon, Chongwon Cho, Karim Eldefrawy in Cyber Security Cryptography and Machine Le… (2017)

  8. Chapter and Conference Paper

    Deniable Attribute Based Encryption for Branching Programs from LWE

    Deniable encryption (Canetti et al. CRYPTO ’97) is an intriguing primitive that provides a security guarantee against not only eavesdrop** attacks as required by semantic security, but also stronger coercion...

    Daniel Apon, **ong Fan, Feng-Hao Liu in Theory of Cryptography (2016)

  9. Chapter and Conference Paper

    Verifiable Oblivious Storage

    We formalize the notion of Verifiable Oblivious Storage (VOS), where a client outsources the storage of data to a server while ensuring data confidentiality, access pattern privacy, and integrity and freshness of...

    Daniel Apon, Jonathan Katz, Elaine Shi in Public-Key Cryptography – PKC 2014 (2014)