Pseudorandom knapsacks and the sample complexity of LWE search-to-decision reductions D Micciancio, P Mol Annual cryptology conference, 465-484, 2011 | 214 | 2011 |
The tree ensemble layer: Differentiability meets conditional computation H Hazimeh, N Ponomareva, P Mol, Z Tan, R Mazumder International Conference on Machine Learning, 4138-4148, 2020 | 94 | 2020 |
Chosen-ciphertext security from slightly lossy trapdoor functions P Mol, S Yilek International Workshop on Public Key Cryptography, 296-311, 2010 | 62 | 2010 |
Recovering NTRU secret key from inversion oracles P Mol, M Yung Public Key Cryptography–PKC 2008: 11th International Workshop on Practice …, 2008 | 25 | 2008 |
Secret-key authentication beyond the challenge-response paradigm: Definitional issues and new protocols P Mol, S Tessaro Manuscript, December, 2012 | 3 | 2012 |
The Effects of Diversity in Aggregation Games. P Mol, A Vattani, P Voulgaris ICS, 509-521, 2011 | 2 | 2011 |
Lattices and their Applications to RSA Cryptosystem. P Mol National Technical University of Athens, Department of Electrical and …, 2006 | 2 | 2006 |
Throughput/Fairness Trade offs for the iSLIP Scheduling Algorithm P Mol, T Ristov, N Trogkanis | 1 | |
Improving Cryptographic Constructions Using Coding Theory P Mol University of California, San Diego, 2013 | | 2013 |
Whom Are You Chatting With? P Voulgaris, P Mol, A Vattani | | 2008 |
Lattices and Cryptography: An Overview of Recent Results with Emphasis on RSA and NTRU Cryptosystems. P Mol | | 2006 |
Leakage-Resilient Cryptography: A Survey of Recent Advances P Mol | | |