Daniel Wichs

Assistant Professor
Department of Computer Science
Northeastern University

wichs@ccs.neu.edu


I am looking for bright and highly motivated PhD students to work with me on exciting new problems in cryptography [more info].

About Me    [CV]

I am an assistant professor at the department of computer science at Northeastern University. I am affiliated with the theory and security groups.
My main research area is cryptography. Some of the topics I work on are: Aside form the above, I pursue research in all other aspects of cryptography, spanning the full spectrum from theory to practice.
I am also interested in computer security, algorithms, complexity theory, coding theory and information theory.

Prior to joining Northeastern, I was a Josef Raviv Memorial Postdoctoral Fellow
at IBM Research T.J. Watson.

I got my PhD in Computer Science at New York University (NYU) in 2011.
I was very fortunate to have Yevgeniy Dodis as my advisor.
I got my Bachelor's degree in Mathematics and Master's degree in Computer Science at Stanford University in 2005.



Teaching

Fall 2014: CS 3800 - Theory of Computation
Spring 2014: CS 6750 - Cryptography and Communications Security
Fall 2013: CS 3800 - Theory of Computation


Crypto Day

Come to the Charles River Crypto Day! A fun-filled day of cryptography talks held regularly in the Boston/Cambridge area. Co-organized with Vinod Vaikuntanathan and Nir Bitansky.


Program Committees



Publications    [DBLP], [Scholar]

Preprints

Publications

    2015

  1. On the Communication Complexity of Secure Function Evaluation with Long Output
    P. Hubáček and D. Wichs  [
    pdf]
    ITCS 2015


    2014

  2. Outsourcing Private RAM Computation
    C. Gentry, S. Halevi, M. Raykova and D. Wichs
    FOCS 2014   [
    pdf]   [slides]

  3. On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
    S. Garg, C. Gentry, S. Halevi and D. Wichs
    CRYPTO 2014   [
    pdf]   [slides]

  4. How to Eat Your Entropy and Have it Too -- Optimal Recovery Strategies for Compromised RNGs
    Y. Dodis, A. Shamir, N. Stephens-Davidowitz and D. Wichs
    CRYPTO 2014   [
    pdf]

  5. Garbled RAM, Revisited
    C. Gentry, S. Halevi, S. Lu, R. Ostrovsky, M. Raykova and D. Wichs
    EUROCRYPT 2014   (merge of
    [GHRW14] and [LO14])   [slides]

  6. Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits
    S. Faust, P. Mukherjee, D. Venturi and D. Wichs
    EUROCRYPT 2014   [
    pdf]

  7. Key Derivation without Entropy Waste
    Y. Dodis, K. Pietrzak and D. Wichs
    EUROCRYPT 2014   [
    pdf]

    2013


  8. On Continual Leakage of Discrete Log Representations
    S. Agrawal, Y. Dodis, V. Vaikuntanathan and D. Wichs
    ASIACRYPT 2013   [
    pdf]

  9. Fully Homomorphic Message Authenticators
    R. Gennaro and D. Wichs
    ASIACRYPT 2013   [
    pdf]

  10. Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust
    Y. Dodis, D. Pointcheval, S. Ruhault, D. Vergnaud and D. Wichs
    CCS 2013   [
    pdf]   (see also [Slashdot] and [Schneier])

  11. Learning with Rounding, Revisited: New Reduction, Properties and Applications
    J. Alwen, S. Krenn, K. Pietrzak and D. Wichs
    CRYPTO 2013   [
    pdf]

  12. Optimizing ORAM and Using it Efficiently for Secure Computation
    C. Gentry, K. Goldman, S. Halevi, C. Jutla, M. Raykova and D. Wichs
    PETS 2013   [
    pdf]

  13. Leakage-Resilient Cryptography from Minimal Assumptions
    C. Hazay, A. López-Alt, H. Wee and D. Wichs
    EUROCRYPT 2013   [
    pdf]

  14. Dynamic Proofs of Retrievability via Oblivious RAM
    D. Cash, A. Küpçü and D. Wichs
    EUROCRYPT 2013   [
    pdf] [slides]

  15. Why "Fiat-Shamir for Proofs" Lacks a Proof
    N. Bitansky, D. Dachman-Soled, S. Garg, A. Jain, Y. Tauman Kalai, A. Lopez-Alt and D. Wichs
    TCC 2013  (merge of
    [BGW] and [DJKL])

  16. Barriers in Cryptography with Weak, Correlated and Leaky Sources
    D. Wichs
    ITCS 2013   [
    pdf], [slides]

    2012


  17. Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
    G. Asharov, A. Jain, A. López-Alt, E. Tromer, V. Vaikuntanathan and D. Wichs
    EUROCRYPT 2012   (merge
    [AJW] , [LTV])

  18. Message Authentication, Revisited
    Y. Dodis, K. Pietrzak, E. Kiltz and D. Wichs
    EUROCRYPT 2012   [
    pdf]

  19. Counterexamples to Hardness Amplification Beyond Negligible
    Y. Dodis, A. Jain, T. Moran and D. Wichs
    TCC 2012   [
    pdf]   [slides]

    2011


  20. Storing Secrets on Continually Leaky Devices.
    Y. Dodis, A. Lewko, B. Waters and D. Wichs
    FOCS 2011   [
    pdf]   [slides]   [video]

  21. Key-Evolution Schemes Resilient to Space-Bounded Leakage.
    S. Dziembowski, T. Kazana and D. Wichs
    CRYPTO 2011   [
    pdf]

  22. Seperating Succinct Non-Interactive Arguments From All Falsifiable Assumptions.
    C. Gentry and D. Wichs
    STOC 2011   [
    pdf]   [slides]   [video]

  23. Fully Leakage-Resilient Signatures.
    E. Boyle, G. Segev and D. Wichs
    EUROCRYPT 2011 and Journal of Cryptology (invited paper).  [
    pdf]

  24. One-Time Computable Self-Erasing Functions.
    S. Dziembowski, T. Kazana and D. Wichs
    TCC 2011  [
    pdf]

    2010


  25. Efficient Public-Key Cryptography in the Presence of Key Leakage.
    Y. Dodis, K. Haralambiev, A. López-Alt and D. Wichs
    ASIACRYPT 2010 (invited to the Journal of Cryptology)   [
    pdf]

  26. Cryptography Against Continuous Memory Attacks.
    Y. Dodis, K. Haralambiev, A. López-Alt and D. Wichs
    FOCS 2010   [
    pdf]   [slides]   [video]

  27. Public-Key Encryption in the Bounded-Retrieval Model.
    J. Alwen, Y. Dodis, M. Naor, G. Segev, S. Walfish and D. Wichs
    EUROCRYPT 2010   [
    pdf]   [slides]

  28. On Symmetric Encryption and Point Obfuscation.
    R. Canetti, Y. Tauman Kalai, M. Varia and D. Wichs
    TCC 2010   [
    pdf]   [slides]

  29. Non-Malleable Codes.
    S. Dziembowski, K. Pietrzak and D. Wichs
    ITCS 2010   [
    pdf]  [slides]

    2009


  30. Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer.
    J. Garay, D. Wichs and H.S. Zhou
    CRYPTO 2009   [
    pdf]

  31. Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model.
    J. Alwen, Y. Dodis and D. Wichs
    CRYPTO 2009   [
    pdf]   [slides]   [video]

  32. Non-Malleable Extractors and Symmetric Key Cryptography from Weak Secrets.
    Y. Dodis and D. Wichs
    STOC 2009   [
    pdf]  [slides]

  33. Proofs of Retrievability via Hardness Amplification.
    Y. Dodis, S. Vadhan and D. Wichs
    TCC 2009   [
    pdf]   [slides]

  34. Universally Composable Multiparty Computation with Partially Isolated Parties.
    I. Damgård, J.B. Nielsen and D. Wichs
    TCC 2009   [
    pdf]   [slides]

    2008


  35. Isolated Proofs of Knowledge and Isolated Zero Knowledge.
    I. Damgård, J.B. Nielsen and D. Wichs
    EUROCRYPT 2008   [
    pdf]   [slides]

  36. Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors.
    R. Cramer, Y. Dodis, S. Fehr, C. Padro and D. Wichs
    EUROCRYPT 2008   [
    pdf]   [slides]

Thesis, Surveys

  1. PhD Thesis: Cryptographic Resilience to Continual Information Leakage   [pdf]

  2. Survey: Leakage Resilience and the Bounded Retrieval Model
    Joel Alwen, Y. Dodis and D. Wichs
    ICITS 2009   [pdf]



Honors and Awards



Contact Info and Directions

Office Address: Office #340, West Village H (WVH), 440 Huntington Av. [map]
Mailing Address: 360 Huntington Av., #202 WVH, Boston, MA 02115
E-mail: [last-name]@ccs.neu.edu