Spooner, Nicholas
70  Ergebnisse:
Personensuche X
?
1

An Efficient Quantum Parallel Repetition Theorem and Applic..:

, In: Proceedings of the 56th Annual ACM Symposium on Theory of Computing,
Bostanci, John ; Qian, Luowen ; Spooner, Nicholas. - p. 1478-1487 , 2024
 
?
2

Perfect Zero-Knowledge PCPs for #P:

, In: Proceedings of the 56th Annual ACM Symposium on Theory of Computing,
Gur, Tom ; O'Connor, Jack ; Spooner, Nicholas - p. 1724-1730 , 2024
 
?
3

Proof-Carrying Data from Arithmetized Random Oracles:

, In: Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science,
Chen, Megan ; Chiesa, Alessandro ; Gur, Tom.. - p. 379-404 , 2023
 
?
4

Speed-Stacking: Fast Sublinear Zero-Knowledge Proofs for Di..:

, In: Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science,
 
?
5

The Superlinearity Problem in Post-quantum Blockchains:

, In: Financial Cryptography and Data Security; Lecture Notes in Computer Science,
Park, Sunoo ; Spooner, Nicholas - p. 200-217 , 2023
 
?
6

Post-Quantum Zero Knowledge, Revisited or: How to Do Quantu..:

, In: 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS),
Lombardi, Alex ; Ma, Fermi ; Spooner, Nicholas - p. 851-859 , 2022
 
?
7

Post-Quantum Succinct Arguments: Breaking the Quantum Rewin..:

, In: 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS),
 
?
8

Quantum Rewinding for Many-Round Protocols:

, In: Theory of Cryptography; Lecture Notes in Computer Science,
 
?
9

On Succinct Non-interactive Arguments in Relativized Worlds:

, In: Advances in Cryptology – EUROCRYPT 2022; Lecture Notes in Computer Science,
 
?
11

Proof-Carrying Data Without Succinct Arguments:

, In: Advances in Cryptology – CRYPTO 2021; Lecture Notes in Computer Science,
Bünz, Benedikt ; Chiesa, Alessandro ; Lin, William.. - p. 681-710 , 2021
 
?
12

Fractal: Post-quantum and Transparent Recursive Proofs from..:

, In: Advances in Cryptology – EUROCRYPT 2020; Lecture Notes in Computer Science,
 
?
13

Recursive Proof Composition from Accumulation Schemes:

, In: Theory of Cryptography; Lecture Notes in Computer Science,
 
?
14

Efficient Post-quantum SNARKs for RSIS and RLWE and Their A..:

, In: Post-Quantum Cryptography; Lecture Notes in Computer Science,
 
?
15

Linear-Size Constant-Query IOPs for Delegating Computation:

, In: Theory of Cryptography; Lecture Notes in Computer Science,
 
1-15