Jonathan Katz
University of Maryland
H-index: 91
North America-United States
Top articles of Jonathan Katz
Techniques for single round multi-party computation for digital signatures
2024/3/26
A Quantum" Lifting Theorem" for Constructions of Pseudorandom Generators from Random Oracles
arXiv preprint arXiv:2401.14319
2024/1/25
Jonathan Katz
H-Index: 56
Zero-Knowledge Proofs of Training for Deep Neural Networks
Cryptology ePrint Archive
2024
Dimitrios Papadopoulos
H-Index: 3
Jonathan Katz
H-Index: 56
Fiat-Shamir security of FRI and related snarks
2023/12/4
Jonathan Katz
H-Index: 56
Justin Thaler
H-Index: 20
Pratyush Ranjan Tiwari
H-Index: 0
Michał Zając
H-Index: 3
Analyzing the Real-World Security of the Algorand Blockchain
2023/11/15
Abraxas: Throughput-Efficient Hybrid Asynchronous Consensus
2023/11/15
Techniques for securing digital signatures using multi-party computation
2023/6/27
An Analysis of the Algebraic Group Model
2022/12/5
State machine replication under changing network conditions
2022/12/5
TECHNIQUES FOR SECURING APPLICATION PROGRAMMING INTERFACE REQUESTS USING MULTI-PARTY DIGITAL SIGNATURES
2023/1/5
Round Optimal Fully Secure Distributed Key Generation
Cryptology ePrint Archive
2023
Jonathan Katz
H-Index: 56
Scalable Mixed-Mode MPC
Cryptology ePrint Archive
2023
Two-Round Threshold Lattice Signatures from Threshold Homomorphic Encryption
Cryptology ePrint Archive
2023
Jonathan Katz
H-Index: 56
Tjerand Silde
H-Index: 2
Private Anomaly Detection in Linear Controllers: Garbled Circuits vs. Homomorphic Encryption
2022/12/6
Jonathan Katz
H-Index: 56
Musings on the HashGraph Protocol: Its Security and Its Limitations
arXiv preprint arXiv:2210.13682
2022/10/25
Erica Blum
H-Index: 4
Jonathan Katz
H-Index: 56
CoVault: A Secure Analytics Platform
arXiv preprint arXiv:2208.03784
2022/8/7
Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30–July 1, 2022, Proceedings
2022/6/23
Jonathan Katz
H-Index: 56
Cloud Computing Security: Foundations and Research Directions
2022/2/21
Post-Quantum Security of Tweakable Even-Mansour, and Applications
Cryptology ePrint Archive
2022