Collaborations and top research areas from the last five years

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • Evasive LWE Assumptions: Definitions, Classes, and Counterexamples

    Brzuska, C., Ünal, A. & Woo, I. K. Y., 2025, Advances in Cryptology – ASIACRYPT 2024 - 30th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Chung, K.-M. & Sasaki, Y. (eds.). Springer, Vol. 4. p. 418-449 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15487 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • On Bounded Storage Key Agreement and One-Way Functions

    Brzuska, C., Couteau, G., Egger, C. & Quach, W., 2025, Theory of Cryptography - 22nd International Conference, TCC 2024, Proceedings. Boyle, E., Boyle, E. & Mahmoody, M. (eds.). Springer, p. 287-318 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 15364 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Open Access
  • On Building Fine-Grained One-Way Functions from Strong Average-Case Hardness

    Brzuska, C. & Couteau, G., Jan 2025, In: Journal of Cryptology. 38, 1, 8.

    Research output: Contribution to journalArticleScientificpeer-review

    Open Access