Follow
Jiaxin Guan
Jiaxin Guan
Verified email at nyu.edu - Homepage
Title
Cited by
Cited by
Year
Return of GGH15: provable security against zeroizing attacks
J Bartusek, J Guan, F Ma, M Zhandry
Theory of Cryptography Conference, 544-574, 2018
44*2018
Simple Schemes in the Bounded Storage Model
J Guan, M Zhandry
Annual International Conference on the Theory and Applications of …, 2019
152019
Incompressible cryptography
J Guan, D Wichs, M Zhandry
Annual International Conference on the Theory and Applications of …, 2022
132022
Disappearing cryptography in the bounded storage model
J Guan, M Zhandry
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021
102021
A lower bound on the length of signatures based on group actions and generic isogenies
D Boneh, J Guan, M Zhandry
Annual International Conference on the Theory and Applications of …, 2023
62023
Streaming functional encryption
J Guan, A Korb, A Sahai
Annual International Cryptology Conference, 433-463, 2023
12023
Adaptively Secure Streaming Functional Encryption
P Datta, J Guan, A Korb, A Sahai
Cryptology ePrint Archive, 2024
2024
Cryptography against Space-Bounded Adversaries
J Guan
Princeton University, 2023
2023
Multi-Instance Randomness Extraction and Security against Bounded-Storage Mass Surveillance
J Guan, D Wichs, M Zhandry
Cryptology ePrint Archive, 2023
2023
Iterated Inhomogeneous Polynomials
J Guan, M Zhandry
Cryptology ePrint Archive, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–10