About Me
I am a professor at the Khoury College of Computer Science at Northeastern University. My main research area is cryptography. I am part of the theory and security groups. Some of the topics I work on are:
- Computing on encrypted data and program obfuscation.
- Lattice-based cryptography
- Information-theoretic cryptography
- Foundations of cryptography
BIO
Prior to joining Northeastern, I was a Josef Raviv Memorial Postdoctoral Fellow at IBM Research T.J. Watson (2011-2013).I got my PhD in Computer Science at New York University (NYU) in 2011. I was very fortunate to have Yevgeniy Dodis as my advisor.
I got my Bachelor's degree in Mathematics and Master's degree in Computer Science at Stanford University in 2005.
THANKS
To Quanta magazine and WIRED for covering my group's work.To the STOC 2023 PC for the best paper award.
To J.P. Morgan for the 2022 faculty research award.
To the Alfred P. Sloan Foundation for the 2018 Sloan Research Fellowship.
To the NSF for the 2018 CAREER Award.
Research Group
Current | Alumni |
|
LaKyah Tyner (PhD student, co-advised with abhi shelat) Ethan Mook (PhD student)
Cody Freitag (Khoury Distinguished Postdoc) |
Wei-Kai Lin (Postdoc → Professor at Univerdity of Virginia) Chethan Kamath (Postdoc → Postdoc at Tel Aviv → Professor at IIT Bombay) Omer Paneth (Postdoc → Professor at Tel Aviv University) Siyao Guo (Postdoc → Professor at NYU Shanghai) Mor Weiss (Postdoc → Postdoc at IDC Herzliya → Professor at Bar Ilan) Ron Rothblum (Postdoc → Professor at Technion) Alessandra Scafuro (Postdoc → Professor at North Carolina State)
Willy Quach (PhD student → Postdoc at Weizmann → Professor at CISPA Helmholtz ) |

CRYPTO 2024
Teaching
Spring 2025 CS 7810: Foundations of Cryptography
Fall 2024 CS3800 Theory of Computation
Spring 2024 CS 7870 Seminar in TCS: Computing on Encrypted Data
Fall 2023 CS3800 Theory of Computation
Spring 2022 CS 4805/7805 Computational Complextity
Fall 2021 CS 7810: Foundations of Cryptography
Spring 2021 CS 4805/7805 - Advanced/Graduate Theory of Computation
Fall 2020 CS 7880 Special Topics in Cryptography
Spring 2020 CS 4770/6750 Cryptgoraphy
Spring 2018 CS 7805 - PhD Theory of Computation
Fall 2017 CS 7810: Foundations of Cryptography
Spring 2017 CS 7805 - PhD Theory of Computation
Fall 2016 CS 3800 - Theory of Computation
Fall 2015 CS 7880: Graduate Cryptography (Topics in Theory)
Spring 2015 CS 3800 - Theory of Computation
Fall 2014 CS 3800 - Theory of Computation
Spring 2014 CS 6750 - Cryptography and Communications Security
Fall 2013 CS 3800 - Theory of Computation
Service
Co-organizer of the Charles River Crypto Day.Co-organizer of the Simons Summer Program in Cryptography, 2025.
Steering Committee of ITC
Area Chair: CRYPTO 2025, EUROCRYPT 2024
Program Chair: ITC 2020
General Chair: STOC 2016
Program Committees:
CRYPTO 25, STOC 2025, TCC 2024, EUROCRYPT 2024, FOCS 2023, CRYPTO 2022, ITCS 2022, EUROCRYPT 2021,
TCC 2020, SCN 2020, FOCS 2019, CRYPTO 2018, TCC 2017, EUROCRYPT 2017, FOCS 2016, TCC 2015,
ASIACRYPT 2014, ITCS 2014, PKC 2014, CRYPTO 2013, ICITS 2012, TCC 2012, SCN 2012, ICITS 2011
Publications [DBLP], [Scholar], [IACR]
2025
-
Seedless Condensers for Efficiently Samplable Sources
Cody Freitag, Jad Silbak and Daniel Wichs [pdf]
TCC 2025 -
Binary Codes for Computationally Bounded Errors Under Standard Crypto Assumptions
George Lu, Jad Silbak and Daniel Wichs [pdf]
FOCS 2025 -
Succinct Non-interactive Arguments of Proximity
Liyan Chen, Zhengzhong Jin and Daniel Wichs
STOC 2025 -
Unambiguous SNARGs for P from LWE with Applications to PPAD Hardness
Liyan Chen, Cody Freitag, Zhengzhong Jin and Daniel Wichs [pdf]
STOC 2025 -
Black Box Crypto is Useless for Doubly Efficient PIR
Wei-Kai Lin, Ethan Mook and Daniel Wichs [pdf]
EUROCRYPT 2025 -
Unique NIZKs and Steganography Detection
Willy Quach, LaKyah Tyner and Daniel Wichs [pdf]
EUROCRYPT 2025 -
Binary Codes for Error Detection and Correction in a Computationally Bounded World
Jad Silbak and Daniel Wichs [pdf]
EUROCRYPT 2025 -
Detecting and Correcting Computationally Bounded Errors: A Simple Construction Under Minimal Assumptions
Jad Silbak and Daniel Wichs [pdf]
ITCS 2025
2024
-
Adaptively Secure Attribute-Based Encryption from Witness Encryption
Brent Waters and Daniel Wichs [pdf]
TCC 2024 -
Interval Key-Encapsulation Mechanism
Alexander Bienstock, Yevgeniy Dodis, Paul Rösler and Daniel Wichs [pdf]
ASIACRYPT 2024 -
How to Simulate Random Oracles with Auxiliary Input
Yevgeniy Dodis, Aayush Jain, Huijia Lin, Ji Luo and Daniel Wichs [pdf]
FOCS 2024 -
PIR with Client-Side Preprocessing: Information-Theoretic Constructions and Lower Bounds
Yuval Ishai, Elaine Shi and Daniel Wichs [pdf]
CRYPTO 2024 -
Doubly Efficient Cryptography: Commitments, Arguments and RAM MPC
Wei-Kai Lin, Ethan Mook and Daniel Wichs [pdf]
CRYPTO 2024 -
Laconic Function Evaluation and ABE for RAMs from (Ring-)LWE
Fangqi Dong, Zihan Hao, Ethan Mook, Hoeteck Wee and Daniel Wichs [pdf]
CRYPTO 2024 -
Laconic Function Evaluation, Functional Encryption and Obfuscation for RAMs with Sublinear Computation
Fangqi Dong, Zihan Hao, Ethan Mook and Daniel Wichs [pdf]
EUROCRYPT 2024 -
Laconic Function Evaluation, Functional Encryption and Obfuscation for RAMs with Sublinear Computation
Fangqi Dong, Zihan Hao, Ethan Mook and Daniel Wichs [pdf]
EUROCRYPT 2024 - A system capable of verifiably and privately screening global DNA synthesis
Carsten Baum, Jens Berlips, Walther Chen, Hongrui Cui, Ivan Damgård, Jiangbin Dong, Kevin M. Esvelt, Mingyu Gao, Dana Gretton, Leonard Foner, Martin Kysel, Kaiyi Zhang, Juanru Li, Xiang Li, Omer Paneth, Ronald L. Rivest, Francesca Sage-Ling, Adi Shamir, Yue Shen, Meicen Sun, Vinod Vaikuntanathan, Lynn Van Hauwe, Theia Vogel, Benjamin Weinstein-Raun, Yun Wang, Daniel Wichs, Stephen Wooster, Andrew C. Yao, Yu Yu and Haoling Zhang: [link]
PREPRINT
2023
-
Multi-Instance Randomness Extraction and Security against Bounded-Storage Mass Surveillance
Jiaxin Guan, Daniel Wichs and Mark Zhandry [pdf]
TCC 2023 -
Lower Bounds on Anonymous Whistleblowing
Willy Quach, LaKyah Tyner and Daniel Wichs [pdf]
TCC 2023 -
Security with Functional Re-Encryption from CPA
Yevgeniy Dodis, Shai Halevi and Daniel Wichs [pdf]
TCC 2023 -
Universal Amplification of KDM Security: From 1-Key Circular to Multi-Key KDM
Brent Waters and Daniel Wichs [pdf]
CRYPTO 2023 -
The Pseudorandom Oracle Model and Ideal Obfuscation
Aayush Jain, Huijia Lin, Ji Luo and Daniel Wichs [pdf]
CRYPTO 2023 -
Doubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation from Ring LWE
Wei-Kai Lin, Ethan Mook and Daniel Wichs [pdf]
STOC 2023
best paper award -
Boosting Batch Arguments and RAM Delegation
Yael Kalai, Alex Lombardi, Vinod Vaikuntanathan and Daniel Wichs [pdf]
STOC 2023 -
Speak Much, Remember Little: Cryptography in the Bounded Storage Model, Revisited
Yevgeniy Dodis, Willy Quach and Daniel Wichs [pdf]
EUROCRYPT 2023 -
A Map of Witness Maps: New Definitions and Connections
Suvradip Chakraborty, Manoj Prabhakaran and Daniel Wichs [pdf]
PKC 2023
2022
-
Post-Quantum Insecurity from LWE
Alex Lombardi, Ethan Mook, Willy Quach and Daniel Wichs [pdf]
TCC 2022 -
Witness Encryption and Null-IO from Evasive LWE
Vinod Vaikuntanathan, Hoeteck Wee and Daniel Wichs [pdf]
ASIACRYPT 2022 -
Nearly Optimal Property Preserving Hashing
Justin Holmgren, Minghao Liu, LaKyah Tyner and Daniel Wichs [pdf]
CRYPTO 2022 -
Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC
Saikrishna Badrinarayanan, Yuval Ishai, Dakshita Khurana, Amit Sahai and Daniel Wichs [pdf]
ITC 2022 -
Incompressible Cryptography
Jiaxin Guan, Daniel Wichs and Mark Zhandry [pdf]
EUROCRYPT 2022 -
Authentication in the Bounded Storage Model
Yevgeniy Dodis, Willy Quach and Daniel Wichs [pdf]
EUROCRYPT 2022 -
Small-Box Cryptography
Yevgeniy Dodis, Harish Karthikeyan and Daniel Wichs [pdf]
ITCS 2022
2021
-
Updatable Public Key Encryption in the Standard Model
Yevgeniy Dodis, Harish Karthikeyan and Daniel Wichs [pdf]
TCC 2021 -
Succinct LWE Sampling, Random Polynomials, and Obfuscation
Lalita Devadas, Willy Quach, Vinod Vaikuntanathan, Hoeteck Wee and Daniel Wichs [pdf]
TCC 2021 -
Limits on the Adaptive Security of Yao's Garbling
Chethan Kamath, Karen Klein, Krzysztof Pietrzak and Daniel Wichs [pdf]
CRYPTO 2021 -
Targeted Lossy Functions and Applications
Willy Quach, Brent Waters and Daniel Wichs [pdf]
CRYPTO 2021 -
Candidate Obfuscation via Oblivious LWE Sampling
Hoeteck Wee and Daniel Wichs [pdf]
EUROCRYPT 2021
2020
-
Optimal Broadcast Encryption from LWE and Pairings in the Standard Model
Shweta Agrawal, Daniel Wichs and Shota Yamada [pdf]
TCC 2020 -
Leakage-Resilient Key Exchange and Two-Seed Extractors
Xin Li, Fermi Ma, Willy Quach and Daniel Wichs [pdf]
CRYPTO 2020 -
Incompressible Encodings
Tal Moran and Daniel Wichs [pdf]
CRYPTO 2020 -
Extracting Randomness from Extractor-Dependent Sources
Yevgeniy Dodis, Vinod Vaikuntanathan and Daniel Wichs [pdf]
EUROCRYPT 2020 -
Statistical ZAPR Arguments from Bilinear Maps
Alex Lombardi, Vinod Vaikuntanathan and Daniel Wichs [pdf]
EUROCRYPT 2020 -
Two-Round Oblivious Transfer from CDH or LPN
Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny and Daniel Wichs [pdf]
EUROCRYPT 2020 -
Witness Maps and Applications
Suvradip Chakraborty, Manoj Prabhakaran and Daniel Wichs [pdf]
PKC 2020
2019
-
Broadcast and Trace with N^epsilon Ciphertext Size from Standard Assumptions
Rishab Goyal, Willy Quach, Brent Waters and Daniel Wichs [pdf]
CRYPTO 2019 -
Non-Malleable Codes for Decision Trees
Marshall Ball, Siyao Guo and Daniel Wichs [pdf]
CRYPTO 2019 -
Fully Homomorphic Encryption for RAMs
Ariel Hamlin, Justin Holmgren, Mor Weiss and Daniel Wichs [pdf]
CRYPTO 2019 -
New Constructions of Reusable Designated-Verifier NIZKs
Alex Lombardi, Willy Quach, Ron D. Rothblum, Daniel Wichs and David J. Wu [pdf]
CRYPTO 2019 -
Adaptively Secure MPC with Sublinear Communication Complexity
Ran Cohen, Abhi Shelat and Daniel Wichs [pdf]
CRYPTO 2019 -
Fiat-Shamir: From Practice to Theory
Ran Canetti, Yilei Chen, Justin Holmgren, Alex Lombardi, Guy N. Rothblum, Ron D. Rothblum and Daniel Wichs
STOC 2019 (Merge of [CCHLRR] and [CLW]) -
Private Anonymous Data Access
Ariel Hamlin, Rafail Ostrovsky, Mor Weiss and Daniel Wichs [pdf]
EUROCRYPT 2019 -
Worst-Case Hardness for LPN and Cryptographic Hashing via Code Smoothing
Zvika Brakerski, Vadim Lyubashevsky, Vinod Vaikuntanathan and Daniel Wichs [pdf]
EUROCRYPT 2019 -
Reusable Designated-Verifier NIZKs for all NP from CDH
Willy Quach, Ron D. Rothblum and Daniel Wichs [pdf]
EUROCRYPT 2019
2018
-
Traitor-Tracing from LWE Made Simple and Attribute-Based
Yilei Chen, Vinod Vaikuntanathan, Brent Waters, Hoeteck Wee and Daniel Wichs [pdf]
TCC 2018 -
Watermarking PRFs under Standard Assumptions: Public Marking and Security with Extraction Queries
Willy Quach, Daniel Wichs and Giorgos Zirdelis [pdf]
TCC 2018 -
Is there an Oblivious RAM Lower Bound for Online Reads?
Mor Weiss and Daniel Wichs [pdf]
TCC 2018 -
Laconic Function Evaluation and Applications
Willy Quach, Hoeteck Wee and Daniel Wichs [pdf]
FOCS 2018 -
Non-Trivial Witness Encryption and Null-iO from Standard Assumptions
Zvika Brakerski, Aayush Jain, Ilan Komargodski, Alain Passelègue and Daniel Wichs [pdf]
SCN 2018 -
Hardness of Non-Interactive Differential Privacy from One-Way Functions
Lucas Kowalczyk, Tal Malkin, Jonathan R. Ullman and Daniel Wichs [pdf]
CRYPTO 2018 -
Non-Interactive Delegation for Low-Space Non-Deterministic Computation
Saikrishna Badrinarayanan, Yael Kalai, Dakshita Khurana, Amit Sahai and Daniel Wichs [pdf]
STOC 2018 -
Multi-Key Searchable Encryption, Revisited
Ariel Hamlin, Abhi Shelat, Mor Weiss and Daniel Wichs [pdf]
PKC 2018
2017
-
Adaptively Indistinguishable Garbled Circuits
Zahra Jafargholi, Alessandra Scafuro and Daniel Wichs [pdf]
TCC 2017 -
The Edited Truth
Shafi Goldwasser, Saleet Klein and Daniel Wichs [pdf]
TCC 2017 -
Obfuscating Compute-and-Compare Programs under LWE
Daniel Wichs and Giorgos Zirdelis [pdf]
FOCS 2017 -
Be Adaptive, Avoid Overcommitting
Zahra Jafargholi, Chethan Kamath, Karen Klein, Ilan Komargodski, Krzysztof Pietrzak and Daniel Wichs [pdf]
CRYPTO 2017
2016
-
Adaptive Security of Yao's Garbled Circuits
Zahra Jafargholi and Daniel Wichs [pdf]
TCC 2016 -
From Cryptomania to Obfustopia through Secret-Key Functional Encryption
Nir Bitansky, Ryo Nishimaki, Alain Passelègue and Daniel Wichs [pdf]
TCC 2016 -
Standard Security Does Not Imply Indistinguishability Under Selective Opening
Dennis Hofheinz, Vanishree Rao and Daniel Wichs [pdf]
TCC 2016 -
Spooky Encryption and its Applications
Yevgeniy Dodis, Shai Halevi, Ron D. Rothblum and Daniel Wichs [pdf]
CRYPTO 2016 -
Adaptively Secure Garbled Circuits from One-Way Functions
Brett Hemenway, Zahra Jafargholi, Rafail Ostrovsky, Alessandra Scafuro and Daniel Wichs [pdf]
CRYPTO 2016 -
A counterexample to the chain rule for conditional HILL entropy
Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia and Daniel Wichs [pdf]
Computational Complexity Journal -
Watermarking Cryptographic Programs Against Arbitrary Removal Strategies
Ryo Nishimaki and Daniel Wichs [pdf]
STOC 2016 -
Essentially Optimal Robust Secret Sharing with Maximal Corruptions
Allison Bishop, Valerio Pastro, Rajmohan Rajaraman and Daniel Wichs [pdf]
EUROCRYPT 2016
honorable mention for best paper award (one of top 3 papers) -
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
Ryo Nishimaki, Daniel Wichs and Mark Zhandry [pdf]
EUROCRYPT 2016 -
Two Round Mutliparty Computation via Multi-Key FHE
Pratyay Mukherjee and Daniel Wichs [pdf] [slides] [video]
EUROCRYPT 2016 -
Obfuscating Conjunctions under Entropic Ring LWE
Zvika Brakerski, Vinod Vaikuntanathan, Hoeteck Wee and Daniel Wichs
ITCS 2016 -
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM
Srinivas Devadas, Marten van Dijk, Christopher W. Fletcher, Ling Ren, Elaine Shi and Daniel Wichs [pdf] [video]
TCC 2016 -
Perfect Structure on the Edge of Chaos
Nir Bitansky, Omer Paneth and Daniel Wichs [pdf]
TCC 2016
2015
-
New Realizations of Somewhere Statistically Binding Hashing and Positional Accumulators
Tatsuaki Okamoto, Krzysztof Pietrzak, Brent Waters and Daniel Wichs [pdf]
ASIACRYPT 2015 -
Leveled Fully Homomorphic Signatures from Standard Lattices
Sergey Gorbunov, Vinod Vaikuntanathan and Daniel Wichs [pdf] [slides] [video]
STOC 2015 -
Simple Lattice Trapdoor Sampling from a Broad Class of Distributions
Vadim Lyubashevsky and Daniel Wichs [pdf]
PKC 2015 -
Tamper Detection and Continuous Non-Malleable Codes
Zahra Jafargholi and Daniel Wichs [pdf] [slides]
TCC 2015 -
On the Communication Complexity of Secure Function Evaluation with Long Output
Pavel Hubácek and Daniel Wichs [pdf] [slides]
ITCS 2015
2014
-
Outsourcing Private RAM Computation
Craig Gentry, Shai Halevi, Mariana Raykova and Daniel Wichs
FOCS 2014 [pdf] [slides] [video]
-
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
Sanjam Garg, Craig Gentry, Shai Halevi and Daniel Wichs
CRYPTO 2014 (invited to Algorithmica special issue) [pdf] [slides]
-
How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs
Yevgeniy Dodis, Adi Shamir, Noah Stephens-Davidowitz and Daniel Wichs
CRYPTO 2014 (invited to Algorithmica special issue) [pdf] (see also [Schneier])
-
Garbled RAM, Revisited
Craig Gentry, Shai Halevi, Steve Lu, Rafail Ostrovsky, Mariana Raykova and Daniel Wichs
EUROCRYPT 2014 (merge of [GHRW14] and [LO14]) [slides]
-
Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits
Sebastian Faust, Pratyay Mukherjee, Daniele Venturi and Daniel Wichs
EUROCRYPT 2014 [pdf]
-
Key Derivation without Entropy Waste
Yevgeniy Dodis, Krzysztof Pietrzak and Daniel Wichs
EUROCRYPT 2014 [pdf]
2013
-
On Continual Leakage of Discrete Log Representations
Shweta Agrawal, Yevgeniy Dodis, Vinod Vaikuntanathan and Daniel Wichs
ASIACRYPT 2013 [pdf]
-
Fully Homomorphic Message Authenticators
Rosario Gennaro and Daniel Wichs
ASIACRYPT 2013 [pdf]
-
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud and Daniel Wichs
CCS 2013 [pdf] (see also [Slashdot] and [Schneier])
-
Learning with Rounding, Revisited: New Reduction, Properties and Applications
Jo"el Alwen, Stephan Krenn, Krzysztof Pietrzak and Daniel Wichs
CRYPTO 2013 [pdf]
-
Optimizing ORAM and Using it Efficiently for Secure Computation
Craig Gentry, Kenny A. Goldman, Shai Halevi, Charanjit S. Jutla, Mariana Raykova and Daniel Wichs
PETS 2013 [pdf]
-
Leakage-Resilient Cryptography from Minimal Assumptions
Carmit Hazay, Adriana López-Alt, Hoeteck Wee and Daniel Wichs
EUROCRYPT 2013 and Journal of Cryptology [pdf]
-
Dynamic Proofs of Retrievability via Oblivious RAM
David Cash, Alptekin Küpccü and Daniel Wichs
EUROCRYPT 2013 [pdf] [slides]
-
Why "Fiat-Shamir for Proofs" Lacks a Proof
Nir Bitansky, Dana Dachman-Soled, Sanjam Garg, Abhishek Jain, Yael Tauman Kalai, Adriana López-Alt and Daniel Wichs
TCC 2013 (merge of [BGW] and [DJKL])
-
Barriers in Cryptography with Weak, Correlated and Leaky Sources
Daniel Wichs
ITCS 2013 [pdf], [slides]
2012
-
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
Gilad Asharov, Abhishek Jain, Adriana López-Alt, Eran Tromer, Vinod Vaikuntanathan and Daniel Wichs
EUROCRYPT 2012 (merge [AJW] , [LTV])
-
Message Authentication, Revisited
Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak and Daniel Wichs
EUROCRYPT 2012 [pdf]
-
Counterexamples to Hardness Amplification Beyond Negligible
Yevgeniy Dodis, Abhishek Jain, Tal Moran and Daniel Wichs
TCC 2012 [pdf] [slides]
2011
-
Storing Secrets on Continually Leaky Devices.
Yevgeniy Dodis, Allison B. Lewko, Brent Waters and Daniel Wichs
FOCS 2011 [pdf] [slides] [video]
-
Key-Evolution Schemes Resilient to Space-Bounded Leakage.
Stefan Dziembowski, Tomasz Kazana and Daniel Wichs
CRYPTO 2011 [pdf]
-
Separating Succinct Non-Interactive Arguments From All Falsifiable Assumptions.
Craig Gentry and Daniel Wichs
STOC 2011 [pdf] [slides] [video]
-
Fully Leakage-Resilient Signatures.
Elette Boyle, Gil Segev and Daniel Wichs
EUROCRYPT 2011 and Journal of Cryptology (invited paper). [pdf]
-
One-Time Computable Self-Erasing Functions.
Stefan Dziembowski, Tomasz Kazana and Daniel Wichs
TCC 2011 [pdf]
2010
-
Efficient Public-Key Cryptography in the Presence of Key Leakage.
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt and Daniel Wichs
ASIACRYPT 2010 (invited to the Journal of Cryptology) [pdf]
-
Cryptography Against Continuous Memory Attacks.
Yevgeniy Dodis, Kristiyan Haralambiev, Adriana López-Alt and Daniel Wichs
FOCS 2010 [pdf] [slides] [video]
-
Public-Key Encryption in the Bounded-Retrieval Model.
Jo"el Alwen, Yevgeniy Dodis, Moni Naor, Gil Segev, Shabsi Walfish and Daniel Wichs
EUROCRYPT 2010 [pdf] [slides]
-
On Symmetric Encryption and Point Obfuscation.
Ran Canetti, Yael Tauman Kalai, Mayank Varia and Daniel Wichs
TCC 2010 [pdf] [slides]
-
Non-Malleable Codes.
Stefan Dziembowski, Krzysztof Pietrzak and Daniel Wichs
ITCS 2010 [pdf] [slides]
2009
-
Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer.
Juan A. Garay, Daniel Wichs and Hong-Sheng Zhou
CRYPTO 2009 [pdf]
-
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model.
Jo"el Alwen, Yevgeniy Dodis and Daniel Wichs
CRYPTO 2009 [pdf] [slides] [video]
-
Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets.
Yevgeniy Dodis and Daniel Wichs
STOC 2009 [pdf] [slides]
-
Proofs of Retrievability via Hardness Amplification.
Yevgeniy Dodis, Salil P. Vadhan and Daniel Wichs
TCC 2009 [pdf] [slides]
-
Universally Composable Multiparty Computation with Partially Isolated Parties.
Ivan Damgård, Jesper Buus Nielsen and Daniel Wichs
TCC 2009 [pdf] [slides]
2008
-
Isolated Proofs of Knowledge and Isolated Zero Knowledge.
Ivan Damgård, Jesper Buus Nielsen and Daniel Wichs
EUROCRYPT 2008 [pdf] [slides]
-
Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors.
Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró and Daniel Wichs
EUROCRYPT 2008 [pdf] [slides]
Thesis, Surveys
-
PhD Thesis: Cryptographic Resilience to Continual Information Leakage [pdf]
-
Survey: Leakage Resilience and the Bounded Retrieval Model
Joel Alwen, Y. Dodis and D. Wichs
ICITS 2009 [pdf]
Honors and Awards
- Best Paper at STOC 2023.
- Invited Speaker at TCC 2019.
- Alfred P. Sloan Foundation 2018 Sloan Research Fellowship.
- NSF 2018 CAREER Award.
- IBM Josef Raviv Memorial Postdoctoral Fellowship 2011 - 2013.
- IBM Ph.D. Fellowship 2010 - 2011.
- NYU Janet Fabri Prize, for the most outstanding dissertations in Computer Science. 2012.
- NYU Department Nominee for ACM Dissertation Award 2011.
- Courant Institute Harold Grad Memorial Prize for outstanding performance and promise as a graduate student. 2010.
- McCracken Fellowship, New York University. 2006-2011.
Contact Info and Directions
Office Address: Office #615 177 Huntington Ave (Christian Science Building) [map]Mailing Address: Northeastern University, 360 Huntington Av, #615-177, Boston, MA 02115
E-mail: [last-name]@ccs.neu.edu