Mark Landry Zhandry

  • Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
20112021

Research activity per year

If you made any changes in Pure these will be visible here soon.

Search results

  • Article

    A note on the quantum collision and set equality problems

    Zhandry, M., Jan 1 2015, In: Quantum Information and Computation. 15, 7-8, p. 557-567 11 p.

    Research output: Contribution to journalArticlepeer-review

    47 Scopus citations
  • Cutting-edge cryptography through the lens of secret sharing

    Komargodski, I. & Zhandry, M., Dec 2018, In: Information and Computation. 263, p. 75-96 22 p.

    Research output: Contribution to journalArticlepeer-review

    1 Scopus citations
  • Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation

    Boneh, D. & Zhandry, M., Dec 1 2017, In: Algorithmica. 79, 4, p. 1233-1285 53 p.

    Research output: Contribution to journalArticlepeer-review

    12 Scopus citations
  • Multiparty Non-Interactive Key Exchange and More from Isogenies on Elliptic Curves

    Boneh, D., Glass, D., Krashen, D., Lauter, K., Sharif, S., Silverberg, A., Tibouchi, M. & Zhandry, M., Jan 1 2020, In: Journal of Mathematical Cryptology. 14, 1, p. 5-14 10 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
    1 Scopus citations
  • Quantum Lightning Never Strikes the Same State Twice. Or: Quantum Money from Cryptographic Assumptions

    Zhandry, M., Jan 2021, In: Journal of Cryptology. 34, 1, 6.

    Research output: Contribution to journalArticlepeer-review

  • Secure identity-based encryption in the quantum random oracle model

    Zhandry, M., Jun 26 2015, In: International Journal of Quantum Information. 13, 4, 1550014.

    Research output: Contribution to journalArticlepeer-review

    14 Scopus citations
  • The Magic of ELFs

    Zhandry, M., Jul 15 2019, In: Journal of Cryptology. 32, 3, p. 825-866 42 p.

    Research output: Contribution to journalArticlepeer-review

    2 Scopus citations
  • Conference article

    How to construct quantum random functions

    Zhandry, M., Dec 1 2012, In: Proceedings - Annual IEEE Symposium on Foundations of Computer Science, FOCS. p. 679-687 9 p., 6375347.

    Research output: Contribution to journalConference articlepeer-review

    95 Scopus citations
  • Conference contribution

    Affine determinant programs: A framework for obfuscation and witness encryption

    Bartusek, J., Ishai, Y., Jain, A., Ma, F., Sahai, A. & Zhandry, M., Jan 2020, 11th Innovations in Theoretical Computer Science Conference, ITCS 2020. Vidick, T. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 82. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 151).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Annihilation attacks for multilinear maps: Cryptanalysis of indistinguishability obfuscation over GGH13

    Miles, E., Sahai, A. & Zhandry, M., Jan 1 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). Springer Verlag, p. 629-658 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9815).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    61 Scopus citations
  • Anonymous traitor tracing: How to embed arbitrary information in a key

    Nishimaki, R., Wichs, D. & Zhandry, M., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Coron, J-S. (eds.). Springer Verlag, p. 388-419 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9666).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Scopus citations
  • Breaking the sub-exponential barrier in obfustopia

    Garg, S., Pandey, O., Srinivasan, A. & Zhandry, M., 2017, Advances in Cryptology – EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Coron, J-S. & Nielsen, J. B. (eds.). Springer Verlag, p. 156-181 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10212 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Scopus citations
  • Cutting-edge cryptography through the lens of secret sharing

    Komargodski, I. & Zhandry, M., 2016, Theory of Cryptography - 3th International Conference, TCC 2016-A, Proceedings. Kushilevitz, E. & Malkin, T. (eds.). Springer Verlag, p. 449-479 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9563).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Decomposable Obfuscation: A Framework for Building Applications of Obfuscation from Polynomial Hardness

    Liu, Q. & Zhandry, M. L., Jan 1 2017, Theory of Cryptography - 15th International Conference, TCC 2017, Proceedings. Kalai, Y. & Reyzin, L. (eds.). Springer Verlag, p. 138-169 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10677 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Functional encryption without obfuscation

    Garg, S., Gentry, C., Halevi, S. & Zhandry, M., 2016, Theory of Cryptography - 3th International Conference, TCC 2016-A, Proceedings. Kushilevitz, E. & Malkin, T. (eds.). Springer Verlag, p. 480-511 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9563).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    58 Scopus citations
  • Hidden Cosets and Applications to Unclonable Cryptography

    Coladangelo, A., Liu, J., Liu, Q. & Zhandry, M., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 556-584 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12825 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • How to avoid obfuscation using witness PRFS

    Zhandry, M., 2016, Theory of Cryptography - 3th International Conference, TCC 2016-A, Proceedings. Kushilevitz, E. & Malkin, T. (eds.). Springer Verlag, p. 421-448 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9563).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • How to generate and use universal samplers

    Hofheinz, D., Jager, T., Khurana, D., Sahai, A., Waters, B. & Zhandry, M., 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Cheon, J. H. & Takagi, T. (eds.). Springer Verlag, p. 715-744 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10032 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • How to Record Quantum Queries, and Applications to Quantum Indifferentiability

    Zhandry, M., 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Boldyreva, A. & Micciancio, D. (eds.). Springer Verlag, p. 239-268 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11693 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • Indifferentiability for public key cryptosystems

    Zhandry, M. & Zhang, C., 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 63-93 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12170 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Low overhead broadcast encryption from multilinear maps

    Boneh, D., Waters, B. & Zhandry, M., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 1 ed. Springer Verlag, p. 206-223 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8616 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    68 Scopus citations
  • Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation

    Boneh, D. & Zhandry, M., 2014, Advances in Cryptology, CRYPTO 2014 - 34th Annual Cryptology Conference, Proceedings. PART 1 ed. Springer Verlag, p. 480-499 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8616 LNCS, no. PART 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    123 Scopus citations
  • New Approaches for Quantum Copy-Protection

    Aaronson, S., Liu, J., Liu, Q., Zhandry, M. & Zhang, R., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 526-555 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12825 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • New security notions and feasibility results for authentication of quantum data

    Garg, S., Yuen, H. & Zhandry, M., 2017, Advances in Cryptology – CRYPTO 2017 - 37th Annual International Cryptology Conference, Proceedings. Katz, J. & Shacham, H. (eds.). Springer Verlag, p. 342-371 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10402 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • New techniques for obfuscating conjunctions

    Bartusek, J., Lepoint, T., Ma, F. & Zhandry, M., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer Verlag, p. 636-666 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11478 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • New techniques for traitor tracing: Size n1/3 and More from Pairings

    Zhandry, M., 2020, Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Proceedings. Micciancio, D. & Ristenpart, T. (eds.). Springer, p. 652-682 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12170 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • On ELFs, deterministic encryption, and correlated-input security

    Zhandry, M., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer Verlag, p. 3-32 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11478 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • One-shot signatures and applications to hybrid quantum/classical authentication

    Amos, R., Georgiou, M., Kiayias, A. & Zhandry, M., Jun 8 2020, STOC 2020 - Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing. Makarychev, K., Makarychev, Y., Tulsiani, M., Kamath, G. & Chuzhoy, J. (eds.). Association for Computing Machinery, p. 255-268 14 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • On finding quantum multi-collisions

    Liu, Q. & Zhandry, M., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Rijmen, V. & Ishai, Y. (eds.). Springer Verlag, p. 189-218 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11478 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Scopus citations
  • Order-revealing encryption and the hardness of private learning

    Bun, M. & Zhandry, M., 2016, Theory of Cryptography - 13th International Conference, TCC 2016-A, Proceedings. Kushilevitz, E. & Malkin, T. (eds.). Springer Verlag, p. 176-206 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9562).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Parameter-hiding order revealing encryption

    Cash, D., Liu, F. H., O’Neill, A., Zhandry, M. & Zhang, C., 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Springer Verlag, p. 181-210 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11272 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Post-zeroizing obfuscation: New mathematical tools, and the case of evasive circuits

    Badrinarayanan, S., Miles, E., Sahai, A. & Zhandry, M., 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Coron, J-S. (eds.). Springer Verlag, p. 764-791 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9666).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    29 Scopus citations
  • Quantum lightning never strikes the same state twice

    Zhandry, M., 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Ishai, Y. & Rijmen, V. (eds.). Springer Verlag, p. 408-438 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11478 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Quantum-secure message authentication codes

    Boneh, D. & Zhandry, M., 2013, Advances in Cryptology, EUROCRYPT 2013 - 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 592-608 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7881 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    44 Scopus citations
  • Random oracles in a quantum world

    Boneh, D., Dagdelen, Ö., Fischlin, M., Lehmann, A., Schaffner, C. & Zhandry, M., 2011, Advances in Cryptology, ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 41-69 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7073 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    141 Scopus citations
  • Revisiting Post-quantum Fiat-Shamir

    Liu, Q. & Zhandry, M., 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Boldyreva, A. & Micciancio, D. (eds.). Springer Verlag, p. 326-355 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11693 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Scopus citations
  • Schrödinger’s pirate: How to trace a quantum decoder

    Zhandry, M., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 61-91 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12552 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure identity-based encryption in the quantum random oracle model

    Zhandry, M., 2012, Advances in Cryptology, CRYPTO 2012 - 32nd Annual Cryptology Conference, Proceedings. p. 758-775 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7417 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    67 Scopus citations
  • Secure obfuscation in a weak multilinear map model

    Garg, S., Miles, E., Mukherjee, P., Sahai, A., Srinivasan, A. & Zhandry, M., Jan 1 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). Springer Verlag, p. 241-268 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9986 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    46 Scopus citations
  • Secure signatures and chosen ciphertext security in a quantum computing world

    Boneh, D. & Zhandry, M., 2013, Advances in Cryptology, CRYPTO 2013 - 33rd Annual Cryptology Conference, Proceedings. PART 2 ed. p. 361-379 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8043 LNCS, no. PART 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    69 Scopus citations
  • Semantically secure order-revealing encryption: Multi-input functional encryption without obfuscation

    Boneh, D., Lewi, K., Raykova, M., Sahai, A., Zhandry, M. & Zimmerman, J., 2015, Advances in Cryptology - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2015, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 563-594 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9057).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    109 Scopus citations
  • Strong hardness of privacy from weak traitor tracing

    Kowalczyk, L., Malkin, T., Ullman, J. & Zhandry, M., 2016, Theory of Cryptography - 14th International Conference, TCC 2016-B, Proceedings. Smith, A. & Hirt, M. (eds.). Springer Verlag, p. 659-689 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9985 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • The Distinction Between Fixed and Random Generators in Group-Based Assumptions

    Bartusek, J., Ma, F. & Zhandry, M., 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Boldyreva, A. & Micciancio, D. (eds.). Springer Verlag, p. 801-830 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11693 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • The magic of ELFs

    Zhandry, M., 2016, Advances in Cryptology - 36th Annual International Cryptology Conference, CRYPTO 2016, Proceedings. Robshaw, M. & Katz, J. (eds.). Springer Verlag, p. 479-508 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9814).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Scopus citations
  • Towards non-interactive witness hiding

    Kuykendall, B. & Zhandry, M., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 627-656 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12550 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • White Box Traitor Tracing

    Zhandry, M., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 303-333 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12828 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution