default search action
Aayush Jain
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Well-Founded Assumptions. Commun. ACM 67(3): 97-105 (2024) - [j3]Marcelo Contreras, Aayush Jain, Neel Pratik Bhatt, Arunava Banerjee, Ehsan Hashemi:
A survey on 3D object detection in real time for autonomous driving. Frontiers Robotics AI 11 (2024) - [c37]Quang Dao, Aayush Jain:
Lossy Cryptography from Code-Based Assumptions. CRYPTO (3) 2024: 34-75 - [c36]Aayush Jain, Huijia Lin, Sagnik Saha:
A Systematic Study of Sparse LWE. CRYPTO (3) 2024: 210-245 - [c35]Quang Dao, Aayush Jain, Zhengzhong Jin:
Non-interactive Zero-Knowledge from LPN and MQ. CRYPTO (9) 2024: 321-360 - [c34]Ying Feng, Aayush Jain, David P. Woodruff:
Fast White-Box Adversarial Streaming Without a Random Oracle. ICML 2024 - [c33]Nilaksh, Abhishek Ranjan, Shreenabh Agrawal, Aayush Jain, Pushpak Jagtap, Shishir Kolathaya:
Barrier Functions Inspired Reward Shaping for Reinforcement Learning. ICRA 2024: 10807-10813 - [c32]Aayush Jain, Philip Long, Valeria Villani, John D. Kelleher, Maria Chiara Leva:
CoBT: Collaborative Programming of Behaviour Trees from One Demonstration for Robot Manipulation. ICRA 2024: 12993-12999 - [i50]Quang Dao, Aayush Jain:
Lossy Cryptography from Code-Based Assumptions. CoRR abs/2402.03633 (2024) - [i49]Nilaksh Nilaksh, Abhishek Ranjan, Shreenabh Agrawal, Aayush Jain, Pushpak Jagtap, Shishir Kolathaya:
Barrier Functions Inspired Reward Shaping for Reinforcement Learning. CoRR abs/2403.01410 (2024) - [i48]Aayush Jain, Philip Long, Valeria Villani, John D. Kelleher, Maria Chiara Leva:
CoBT: Collaborative Programming of Behaviour Trees from One Demonstration for Robot Manipulation. CoRR abs/2404.05870 (2024) - [i47]Ying Feng, Aayush Jain, David P. Woodruff:
Fast White-Box Adversarial Streaming Without a Random Oracle. CoRR abs/2406.06808 (2024) - [i46]Quang Dao, Aayush Jain:
Lossy Cryptography from Code-Based Assumptions. IACR Cryptol. ePrint Arch. 2024: 175 (2024) - [i45]Quang Dao, Aayush Jain, Zhengzhong Jin:
Non-Interactive Zero-Knowledge from LPN and MQ. IACR Cryptol. ePrint Arch. 2024: 1254 (2024) - [i44]Aayush Jain, Huijia Lin, Sagnik Saha:
A Systematic Study of Sparse LWE. IACR Cryptol. ePrint Arch. 2024: 1589 (2024) - 2023
- [c31]Aayush Jain, Huijia Lin, Ji Luo, Daniel Wichs:
The Pseudorandom Oracle Model and Ideal Obfuscation. CRYPTO (4) 2023: 233-262 - [c30]Yuval Ishai, Aayush Jain, Paul Lou, Amit Sahai, Mark Zhandry:
Computational Wiretap Coding from Indistinguishability Obfuscation. CRYPTO (4) 2023: 263-293 - [c29]Quang Dao, Yuval Ishai, Aayush Jain, Huijia Lin:
Multi-party Homomorphic Secret Sharing and Sublinear MPC from Sparse LPN. CRYPTO (2) 2023: 315-348 - [c28]Rex Fernando, Aayush Jain, Ilan Komargodski:
Maliciously-Secure MrNISC in the Plain Model. EUROCRYPT (2) 2023: 98-128 - [c27]Aayush Jain, Huijia Lin, Paul Lou, Amit Sahai:
Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-quantum i풪. EUROCRYPT (1) 2023: 205-235 - [c26]Aayush Jain, Huijia Lin, Ji Luo:
On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption. EUROCRYPT (3) 2023: 479-510 - [c25]Behnood Rasti, Aayush Jain, Margret C. Fuchs, Pedram Ghamisi, Richard Gloaguen:
Hyperspectral Domain Adaptation for the Detection of Material Types in Recycling Streams at the Example of Electrolyzers. IGARSS 2023: 7618-7620 - [i43]Orestis Chardouvelis, Vipul Goyal, Aayush Jain, Jiahui Liu:
Quantum Key Leasing for PKE and FHE with a Classical Lessor. CoRR abs/2310.14328 (2023) - [i42]Yuval Ishai, Aayush Jain, Paul Lou, Amit Sahai, Mark Zhandry:
Computational Wiretap Coding from Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2023: 1270 (2023) - [i41]Quang Dao, Yuval Ishai, Aayush Jain, Huijia Lin:
Multi-Party Homomorphic Secret Sharing and Sublinear MPC from Sparse LPN. IACR Cryptol. ePrint Arch. 2023: 1593 (2023) - [i40]Orestis Chardouvelis, Vipul Goyal, Aayush Jain, Jiahui Liu:
Quantum Key Leasing for PKE and FHE with a Classical Lessor. IACR Cryptol. ePrint Arch. 2023: 1640 (2023) - 2022
- [c24]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from LPN over $\mathbb {F}_p$, DLIN, and PRGs in NC0. EUROCRYPT (1) 2022: 670-699 - [i39]Shreya Bhatt, Aayush Jain, Parv Maheshwari, Animesh Jha, Debashish Chakravarty:
[Reproducibility Report] Path Planning using Neural A* Search. CoRR abs/2208.04153 (2022) - [i38]Aayush Jain, Huijia Lin, Ji Luo, Daniel Wichs:
The Pseudorandom Oracle Model and Ideal Obfuscation. IACR Cryptol. ePrint Arch. 2022: 1204 (2022) - [i37]Aayush Jain, Huijia Lin, Ji Luo:
On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2022: 1317 (2022) - [i36]Aayush Jain, Huijia Lin, Paul Lou, Amit Sahai:
Polynomial-Time Cryptanalysis of the Subspace Flooding Assumption for Post-Quantum i풪. IACR Cryptol. ePrint Arch. 2022: 1637 (2022) - 2021
- [b1]Aayush Jain:
Indistinguishability Obfuscation from Well-Studied Assumptions. University of California, Los Angeles, USA, 2021 - [c23]Samuel B. Hopkins, Aayush Jain, Huijia Lin:
Counterexamples to New Circular Security Assumptions Underlying iO. CRYPTO (2) 2021: 673-700 - [c22]Romain Gay, Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification. EUROCRYPT (3) 2021: 97-126 - [c21]Fabrice Benhamouda, Aayush Jain, Ilan Komargodski, Huijia Lin:
Multiparty Reusable Non-interactive Secure Computation from LWE. EUROCRYPT (2) 2021: 724-753 - [c20]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability obfuscation from well-founded assumptions. STOC 2021: 60-73 - [i35]Aayush Jain, Varun Kohli, Girish Mishra:
Deep Learning based Differential Distinguisher for Lightweight Block Ciphers. CoRR abs/2112.05061 (2021) - [i34]Fabrice Benhamouda, Aayush Jain, Ilan Komargodski, Huijia Lin:
Multiparty Reusable Non-Interactive Secure Computation from LWE. IACR Cryptol. ePrint Arch. 2021: 378 (2021) - [i33]Samuel B. Hopkins, Aayush Jain, Huijia Lin:
Counterexamples to New Circular Security Assumptions Underlying iO. IACR Cryptol. ePrint Arch. 2021: 889 (2021) - [i32]Rex Fernando, Aayush Jain, Ilan Komargodski:
Maliciously-Secure MrNISC in the Plain Model. IACR Cryptol. ePrint Arch. 2021: 1319 (2021) - [i31]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from LPN over F_p, DLIN, and PRGs in NC^0. IACR Cryptol. ePrint Arch. 2021: 1334 (2021) - [i30]Aayush Jain, Alexis Korb, Paul Lou, Amit Sahai:
A Note on the Pseudorandomness of Low-Degree Polynomials over the Integers. IACR Cryptol. ePrint Arch. 2021: 1415 (2021) - 2020
- [j2]Pankaj Dutta, Aayush Jain, Asish Gupta:
Performance analysis of non-banking finance companies using two-stage data envelopment analysis. Ann. Oper. Res. 295(1): 91-116 (2020) - [c19]Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai:
Secure MPC: Laziness Leads to GOD. ASIACRYPT (3) 2020: 120-150 - [c18]Aayush Jain, Alexis Korb, Nathan Manohar, Amit Sahai:
Amplifying the Security of Functional Encryption, Unconditionally. CRYPTO (1) 2020: 717-746 - [c17]Aayush Jain, Nathan Manohar, Amit Sahai:
Combiners for Functional Encryption, Unconditionally. EUROCRYPT (1) 2020: 141-168 - [c16]Saikrishna Badrinarayanan, Rex Fernando, Aayush Jain, Dakshita Khurana, Amit Sahai:
Statistical ZAP Arguments. EUROCRYPT (3) 2020: 642-667 - [c15]James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai, Mark Zhandry:
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption. ITCS 2020: 82:1-82:39 - [c14]Aayush Jain, Meet Shah, Suraj Pandey, Mansi Agarwal, Rajiv Ratn Shah, Yifang Yin:
SeekSuspect: retrieving suspects from criminal datasets using visual memory. MMAsia 2020: 71:1-71:3 - [i29]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Well-Founded Assumptions. CoRR abs/2008.09317 (2020) - [i28]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Well-Founded Assumptions. Electron. Colloquium Comput. Complex. TR20 (2020) - [i27]Aayush Jain, Nathan Manohar, Amit Sahai:
Combiners for Functional Encryption, Unconditionally. IACR Cryptol. ePrint Arch. 2020: 154 (2020) - [i26]Romain Gay, Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification. IACR Cryptol. ePrint Arch. 2020: 764 (2020) - [i25]Aayush Jain, Varun Kohli, Girish Mishra:
Deep Learning based Differential Distinguisher for Lightweight Cipher PRESENT. IACR Cryptol. ePrint Arch. 2020: 846 (2020) - [i24]James Bartusek, Yuval Ishai, Aayush Jain, Fermi Ma, Amit Sahai, Mark Zhandry:
Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption. IACR Cryptol. ePrint Arch. 2020: 889 (2020) - [i23]Aayush Jain, Alexis Korb, Nathan Manohar, Amit Sahai:
Amplifying the Security of Functional Encryption, Unconditionally. IACR Cryptol. ePrint Arch. 2020: 951 (2020) - [i22]Aayush Jain, Huijia Lin, Amit Sahai:
Indistinguishability Obfuscation from Well-Founded Assumptions. IACR Cryptol. ePrint Arch. 2020: 1003 (2020)
2010 – 2019
- 2019
- [c13]Prabhanjan Ananth, Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai:
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification. CRYPTO (3) 2019: 284-332 - [c12]Vipul Goyal, Aayush Jain, Amit Sahai:
Simultaneous Amplification: The Case of Non-interactive Zero-Knowledge. CRYPTO (2) 2019: 608-637 - [c11]Boaz Barak, Samuel B. Hopkins, Aayush Jain, Pravesh Kothari, Amit Sahai:
Sum-of-Squares Meets Program Obfuscation, Revisited. EUROCRYPT (1) 2019: 226-250 - [c10]Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai:
How to Leverage Hardness of Constant-Degree Expanding Polynomials over \mathbb R R to build i풪 i O. EUROCRYPT (1) 2019: 251-281 - [c9]Prabhanjan Ananth, Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai:
From FE Combiners to Secure MPC and Back. TCC (1) 2019: 199-228 - [i21]Vipul Goyal, Aayush Jain, Amit Sahai:
Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge. IACR Cryptol. ePrint Arch. 2019: 626 (2019) - [i20]Prabhanjan Ananth, Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai:
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification. IACR Cryptol. ePrint Arch. 2019: 643 (2019) - [i19]Saikrishna Badrinarayanan, Rex Fernando, Aayush Jain, Dakshita Khurana, Amit Sahai:
Statistical ZAP Arguments. IACR Cryptol. ePrint Arch. 2019: 780 (2019) - [i18]Aayush Jain, Huijia Lin, Christian Matt, Amit Sahai:
How to leverage hardness of constant degree expanding polynomials over R to build iO. IACR Cryptol. ePrint Arch. 2019: 1030 (2019) - [i17]Aayush Jain, Huijia Lin, Amit Sahai:
Simplifying Constructions and Assumptions for i풪. IACR Cryptol. ePrint Arch. 2019: 1252 (2019) - 2018
- [c8]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai:
Threshold Cryptosystems from Threshold Fully Homomorphic Encryption. CRYPTO (1) 2018: 565-596 - [c7]Zvika Brakerski, Aayush Jain, Ilan Komargodski, Alain Passelègue, Daniel Wichs:
Non-trivial Witness Encryption and Null-iO from Standard Assumptions. SCN 2018: 425-441 - [i16]Prabhanjan Ananth, Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai:
From FE Combiners to Secure MPC and Back. IACR Cryptol. ePrint Arch. 2018: 457 (2018) - [i15]Saikrishna Badrinarayanan, Aayush Jain, Nathan Manohar, Amit Sahai:
Secure MPC: Laziness Leads to GOD. IACR Cryptol. ePrint Arch. 2018: 580 (2018) - [i14]Prabhanjan Ananth, Aayush Jain, Dakshita Khurana, Amit Sahai:
Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness. IACR Cryptol. ePrint Arch. 2018: 615 (2018) - [i13]Aayush Jain, Amit Sahai:
How to leverage hardness of constant-degree expanding polynomials over ℝ to build iO. IACR Cryptol. ePrint Arch. 2018: 973 (2018) - [i12]Boaz Barak, Samuel B. Hopkins, Aayush Jain, Pravesh Kothari, Amit Sahai:
Sum-of-Squares Meets Program Obfuscation, Revisited. IACR Cryptol. ePrint Arch. 2018: 1237 (2018) - 2017
- [j1]Anush Sankaran, Aayush Jain, Tarun Vashisth, Mayank Vatsa, Richa Singh:
Adaptive latent fingerprint segmentation using feature selection and random decision forest classification. Inf. Fusion 34: 1-15 (2017) - [c6]Prabhanjan Ananth, Aayush Jain, Amit Sahai:
Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption. EUROCRYPT (1) 2017: 91-121 - [c5]Zvika Brakerski, Nishanth Chandran, Vipul Goyal, Aayush Jain, Amit Sahai, Gil Segev:
Hierarchical Functional Encryption. ITCS 2017: 8:1-8:27 - [i11]Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai:
A note on VRFs from Verifiable Functional Encryption. IACR Cryptol. ePrint Arch. 2017: 51 (2017) - [i10]Prabhanjan Ananth, Aayush Jain, Amit Sahai:
Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption. IACR Cryptol. ePrint Arch. 2017: 127 (2017) - [i9]Aayush Jain, Peter M. R. Rasmussen, Amit Sahai:
Threshold Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 257 (2017) - [i8]Zvika Brakerski, Aayush Jain, Ilan Komargodski, Alain Passelègue, Daniel Wichs:
Non-Trivial Witness Encryption and Null-iO from Standard Assumptions. IACR Cryptol. ePrint Arch. 2017: 874 (2017) - [i7]Dan Boneh, Rosario Gennaro, Steven Goldfeder, Aayush Jain, Sam Kim, Peter M. R. Rasmussen, Amit Sahai:
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 956 (2017) - 2016
- [c4]Vipul Goyal, Aayush Jain, Adam O'Neill:
Multi-input Functional Encryption with Unbounded-Message Security. ASIACRYPT (2) 2016: 531-556 - [c3]Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai:
Verifiable Functional Encryption. ASIACRYPT (2) 2016: 557-587 - [c2]Prabhanjan Ananth, Aayush Jain, Moni Naor, Amit Sahai, Eylon Yogev:
Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption. CRYPTO (2) 2016: 491-520 - [i6]Prabhanjan Ananth, Aayush Jain, Moni Naor, Amit Sahai, Eylon Yogev:
Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security. IACR Cryptol. ePrint Arch. 2016: 281 (2016) - [i5]Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai:
Verifiable Functional Encryption. IACR Cryptol. ePrint Arch. 2016: 629 (2016) - 2015
- [i4]Nishanth Chandran, Vipul Goyal, Aayush Jain, Amit Sahai:
Functional Encryption: Decentralised and Delegatable. IACR Cryptol. ePrint Arch. 2015: 1017 (2015) - [i3]Vipul Goyal, Aayush Jain, Dakshita Khurana:
Witness Signatures and Non-Malleable Multi-Prover Zero-Knowledge Proofs. IACR Cryptol. ePrint Arch. 2015: 1095 (2015) - [i2]Vipul Goyal, Aayush Jain, Adam O'Neill:
Multi-Input Functional Encryption with Unbounded-Message Security. IACR Cryptol. ePrint Arch. 2015: 1113 (2015) - 2014
- [c1]Aayush Jain, Saikiran Maguluri, Prakash Shukla, Poorvi Vijay, Keyur Sorathia:
Exploring Tangible Interactions for Capturing Self Photographs. IHCI 2014: 116-121 - 2013
- [i1]Aayush Jain:
On FHE without bootstrapping. IACR Cryptol. ePrint Arch. 2013: 60 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint