Daniel Apon
Daniel Apon
Verified email at cs.umd.edu
Title
Cited by
Cited by
Year
Status report on the first round of the NIST post-quantum cryptography standardization process
G Alagic, G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, YK Liu, ...
US Department of Commerce, National Institute of Standards and Technology, 2019
1042019
Status report on the second round of the NIST post-quantum cryptography standardization process
G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, J Kelsey, YK Liu, ...
US Department of Commerce, NIST, 2020
802020
Method for using a motorized camera mount for tracking in augmented reality
AW Hobgood, JF Ebersole Jr, JF Walker, JF Ebersole
US Patent 6,903,707, 2005
792005
Verifiable oblivious storage
D Apon, J Katz, E Shi, A Thiruvengadam
International Workshop on Public Key Cryptography, 131-148, 2014
752014
POPE: Partial order preserving encoding
DS Roche, D Apon, SG Choi, A Yerukhimovich
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
682016
Implementing Cryptographic Program Obfuscation.
D Apon, Y Huang, J Katz, AJ Malozemoff
IACR Cryptol. ePrint Arch. 2014, 779, 2014
542014
Cryptanalysis of indistinguishability obfuscations of circuits over GGH13
D Apon, N Döttling, S Garg, P Mukherjee
44th International Colloquium on Automata, Languages, and Programming (ICALP …, 2017
492017
Efficient, reusable fuzzy extractors from LWE
D Apon, C Cho, K Eldefrawy, J Katz
International Conference on Cyber Security Cryptography and Machine Learning …, 2017
342017
5gen: A framework for prototyping applications using multilinear maps and matrix branching programs
K Lewi, AJ Malozemoff, D Apon, B Carmer, A Foltzer, D Wagner, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
332016
Dimension-Preserving Reductions from LWE to LWR.
J Alperin-Sheriff, D Apon
IACR Cryptol. ePrint Arch. 2016, 589, 2016
282016
Fully-Secure Lattice-Based IBE as Compact as PKE.
D Apon, X Fan, FH Liu
IACR Cryptol. ePrint Arch. 2016, 125, 2016
162016
Hierarchical decomposition of a manufacturing work cell to promote monitoring, diagnostics, and prognostics
BA Weiss, G Qiao
International Manufacturing Science and Engineering Conference 50749 …, 2017
132017
Compact identity based encryption from LWE
D Apon, X Fan, F Liu
Cryptol. ePrint Arch 2016, 2016
122016
Cryptanalysis of ledacrypt
D Apon, R Perlner, A Robinson, P Santini
Annual International Cryptology Conference, 389-418, 2020
112020
Constant-round group key exchange from the ring-LWE assumption
D Apon, D Dachman-Soled, H Gong, J Katz
International Conference on Post-Quantum Cryptography, 189-205, 2019
112019
Nistir 8240-status report on the first round of the nist post-quantum cryptography standardization process
G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, YK Liu, C Miller, ...
NIST post-quantum cryptography standardization, 2019
112019
Recommendation for stateful hash-based signature schemes
DA Cooper, DC Apon, QH Dang, MS Davidson, MJ Dworkin, CA Miller
NIST Special Publication 800, 208, 2020
102020
Deniable attribute based encryption for branching programs from LWE
D Apon, X Fan, FH Liu
Theory of Cryptography Conference, 299-329, 2016
102016
Status Report on the Second Round of the NIST Post-Quantum Cryptography Standardization Process
D Moody, G Alagic, DC Apon, DA Cooper, QH Dang, JM Kelsey, YK Liu, ...
92020
Vector Encoding over Lattices and Its Applications.
D Apon, X Fan, FH Liu
IACR Cryptol. ePrint Arch. 2017, 455, 2017
62017
The system can't perform the operation now. Try again later.
Articles 1–20