Follow
Daniel Apon
Daniel Apon
Verified email at cs.umd.edu
Title
Cited by
Cited by
Year
Status report on the third round of the NIST post-quantum cryptography standardization process
G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang, J Kelsey, ...
US Department of Commerce, National Institute of Standards and Technology 4, 07, 2022
5242022
Status report on the second round of the NIST post-quantum cryptography standardization process
G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, J Kelsey, YK Liu, ...
US Department of Commerce, NIST 2, 69, 2020
3722020
POPE: Partial order preserving encoding
DS Roche, D Apon, SG Choi, A Yerukhimovich
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
952016
Verifiable oblivious storage
D Apon, J Katz, E Shi, A Thiruvengadam
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
852014
Status report on the second round of the NIST post-quantum cryptography standardization process
D Moody, G Alagic, DC Apon, DA Cooper, QH Dang, JM Kelsey, YK Liu, ...
Dustin Moody, Gorjan Alagic, Daniel C. Apon, David A. Cooper, Quynh H. Dang …, 2020
822020
Recommendation for stateful hash-based signature schemes
DA Cooper, DC Apon, QH Dang, MS Davidson, MJ Dworkin, CA Miller
NIST Special Publication 800 (208), 800-208, 2020
792020
Efficient, reusable fuzzy extractors from LWE
D Apon, C Cho, K Eldefrawy, J Katz
International Conference on Cyber Security Cryptography and Machine Learning …, 2017
672017
Implementing cryptographic program obfuscation
D Apon, Y Huang, J Katz, AJ Malozemoff
Cryptology ePrint Archive, 2014
612014
Cryptanalysis of indistinguishability obfuscations of circuits over GGH13
D Apon, N Döttling, S Garg, P Mukherjee
Cryptology ePrint Archive, 2016
562016
Dimension-preserving reductions from LWE to LWR
J Alperin-Sheriff, D Apon
Cryptology ePrint Archive, 2016
442016
5gen: A framework for prototyping applications using multilinear maps and matrix branching programs
K Lewi, AJ Malozemoff, D Apon, B Carmer, A Foltzer, D Wagner, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
372016
When frodo flips: End-to-end key recovery on frodokem via rowhammer
M Fahr Jr, H Kippen, A Kwong, T Dang, J Lichtinger, D Dachman-Soled, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
302022
Constant-round group key exchange from the ring-LWE assumption
D Apon, D Dachman-Soled, H Gong, J Katz
Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019 …, 2019
282019
Cryptanalysis of ledacrypt
D Apon, R Perlner, A Robinson, P Santini
Annual International Cryptology Conference, 389-418, 2020
272020
SoK: How (not) to design and implement post-quantum cryptography
J Howe, T Prest, D Apon
Cryptographers’ Track at the RSA Conference, 444-477, 2021
262021
Status report on the third round of the NIST Post-Quantum Cryptography Standardization Process (2022)
G Alagic, D Apon, D Cooper, Q Dang, T Dang, J Kelsey, J Lichtinger, ...
DOI: https://doi. org/10.6028/NIST. IR 8413, 2023
212023
Status report on the first round of the NIST Post-Quantum Cryptography Standardization Process, NISTIR 8240 (2019)
G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, YK Liu, C Miller, ...
URL: https://csrc. nist. gov/publications/detail/nistir/8240/final …, 0
21
Deniable attribute based encryption for branching programs from LWE
D Apon, X Fan, FH Liu
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016
202016
Status report on the second round of the NIST post-quantum cryptography standardization process (2020)
G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, J Kelsey, YK Liu, ...
NIST IR 8309, 2020
192020
Compact identity based encryption from LWE
D Apon, X Fan, FH Liu
Cryptology ePrint Archive, 2016
182016
The system can't perform the operation now. Try again later.
Articles 1–20