The following publications are possibly variants of this publication:
- Candidate Obfuscation via Oblivious LWE SamplingHoeteck Wee, Daniel Wichs. iacr, 2020:1042, 2020. [doi]
- Succinct LWE Sampling, Random Polynomials, and ObfuscationLalita Devadas, Willy Quach, Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs. tcc 2021: 256-287 [doi]
- Succinct LWE Sampling, Random Polynomials, and ObfuscationLalita Devadas, Willy Quach, Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs. iacr, 2021:1226, 2021. [doi]
- Obfuscating Compute-and-Compare Programs under LWEDaniel Wichs, Giorgos Zirdelis. focs 2017: 600-611 [doi]
- Obfuscating Compute-and-Compare Programs under LWEDaniel Wichs, Giorgos Zirdelis. iacr, 2017:276, 2017. [doi]
- Obfuscating Conjunctions under Entropic Ring LWEZvika Brakerski, Vinod Vaikuntanathan, Hoeteck Wee, Daniel Wichs. innovations 2016: 147-156 [doi]