Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Pratyay Mukherjee
@article{DBLP:journals/iacr/DeyMSS24, author = {Pousali Dey and Pratyay Mukherjee and Swagata Sasmal and Rohit Sinha}, title = {HiSE: Hierarchical (Threshold) Symmetric-key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {158}, year = {2024}, url = {https://eprint.iacr.org/2024/158}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DeyMSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KateMMM23, author = {Aniket Kate and Easwar Vivek Mangipudi and Siva Maradana and Pratyay Mukherjee}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {1776--1790}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3616601}, doi = {10.1145/3576915.3616601}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KateMMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargJMSWZ23, author = {Sanjam Garg and Abhishek Jain and Pratyay Mukherjee and Rohit Sinha and Mingyuan Wang and Yinuo Zhang}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Cryptography with Weights: MPC, Encryption and Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {295--327}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_10}, doi = {10.1007/978-3-031-38557-5\_10}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/GargJMSWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gecco/MukherjeeAD23, author = {Pratyay Mukherjee and Ramanathan A and Sawvranu Dey}, editor = {Sara Silva and Lu{\'{\i}}s Paquete}, title = {Efficient Vehicle Routing Problem: {A} Machine Learning and Evolutionary Computation Approach}, booktitle = {Companion Proceedings of the Conference on Genetic and Evolutionary Computation, {GECCO} 2023, Companion Volume, Lisbon, Portugal, July 15-19, 2023}, pages = {3--4}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3583133.3596425}, doi = {10.1145/3583133.3596425}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gecco/MukherjeeAD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BadrinarayananMMPRS23, author = {Saikrishna Badrinarayanan and Daniel Masny and Pratyay Mukherjee and Sikhar Patranabis and Srinivasan Raghuraman and Pratik Sarkar}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Round-Optimal Oblivious Transfer and {MPC} from Computational {CSIDH}}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {376--405}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_14}, doi = {10.1007/978-3-031-31368-4\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/BadrinarayananMMPRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BairdGJMSWZ23, author = {Leemon Baird and Sanjam Garg and Abhishek Jain and Pratyay Mukherjee and Rohit Sinha and Mingyuan Wang and Yinuo Zhang}, title = {Threshold Signatures in the Multiverse}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {1454--1470}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179436}, doi = {10.1109/SP46215.2023.10179436}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BairdGJMSWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BadrinarayananMMR23, author = {Saikrishna Badrinarayanan and Peihan Miao and Pratyay Mukherjee and Divya Ravi}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {On the Round Complexity of Fully Secure Solitary {MPC} with Honest Majority}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14370}, pages = {124--155}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48618-0\_5}, doi = {10.1007/978-3-031-48618-0\_5}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BadrinarayananMMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BairdGJMSWZ23, author = {Leemon Baird and Sanjam Garg and Abhishek Jain and Pratyay Mukherjee and Rohit Sinha and Mingyuan Wang and Yinuo Zhang}, title = {Threshold Signatures in the Multiverse}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {63}, year = {2023}, url = {https://eprint.iacr.org/2023/063}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BairdGJMSWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KateMMST23, author = {Aniket Kate and Easwar Vivek Mangipudi and Pratyay Mukherjee and Hamza Saleem and Sri Aravinda Krishnan Thyagarajan}, title = {Non-interactive {VSS} using Class Groups and Application to {DKG}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {451}, year = {2023}, url = {https://eprint.iacr.org/2023/451}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KateMMST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargJMSWZ23, author = {Sanjam Garg and Abhishek Jain and Pratyay Mukherjee and Rohit Sinha and Mingyuan Wang and Yinuo Zhang}, title = {hinTS: Threshold Signatures with Silent Setup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {567}, year = {2023}, url = {https://eprint.iacr.org/2023/567}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GargJMSWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KateMMM23, author = {Aniket Kate and Easwar Vivek Mangipudi and Siva Maradana and Pratyay Mukherjee}, title = {FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1339}, year = {2023}, url = {https://eprint.iacr.org/2023/1339}, timestamp = {Wed, 22 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KateMMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BadrinarayananM22, author = {Saikrishna Badrinarayanan and Daniel Masny and Pratyay Mukherjee}, editor = {Giuseppe Ateniese and Daniele Venturi}, title = {Efficient and Tight Oblivious Transfer from {PKE} with Tight Multi-user Security}, booktitle = {Applied Cryptography and Network Security - 20th International Conference, {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13269}, pages = {626--642}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09234-3\_31}, doi = {10.1007/978-3-031-09234-3\_31}, timestamp = {Tue, 21 Jun 2022 15:24:40 +0200}, biburl = {https://dblp.org/rec/conf/acns/BadrinarayananM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BairdM022, author = {Leemon Baird and Pratyay Mukherjee and Rohit Sinha}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains?}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {235--248}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560704}, doi = {10.1145/3548606.3560704}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BairdM022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BienstockFGMR22, author = {Alexander Bienstock and Jaiden Fairoze and Sanjam Garg and Pratyay Mukherjee and Srinivasan Raghuraman}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {A More Complete Analysis of the Signal Double Ratchet Algorithm}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {784--813}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_27}, doi = {10.1007/978-3-031-15802-5\_27}, timestamp = {Wed, 19 Oct 2022 17:37:44 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BienstockFGMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/AgrawalDLMR22, author = {Shashank Agrawal and Wei Dai and Atul Luykx and Pratyay Mukherjee and Peter Rindal}, editor = {Takanori Isobe and Santanu Sarkar}, title = {ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2022 - 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13774}, pages = {26--51}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22912-1\_2}, doi = {10.1007/978-3-031-22912-1\_2}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/AgrawalDLMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BienstockFGMR22, author = {Alexander Bienstock and Jaiden Fairoze and Sanjam Garg and Pratyay Mukherjee and Srinivasan Raghuraman}, title = {A More Complete Analysis of the Signal Double Ratchet Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {355}, year = {2022}, url = {https://eprint.iacr.org/2022/355}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BienstockFGMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananM22, author = {Saikrishna Badrinarayanan and Daniel Masny and Pratyay Mukherjee}, title = {Efficient and Tight Oblivious Transfer from {PKE} with Tight Multi-User Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {415}, year = {2022}, url = {https://eprint.iacr.org/2022/415}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalDLMR22, author = {Shashank Agrawal and Wei Dai and Atul Luykx and Pratyay Mukherjee and Peter Rindal}, title = {ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1449}, year = {2022}, url = {https://eprint.iacr.org/2022/1449}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalDLMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananM22a, author = {Saikrishna Badrinarayanan and Daniel Masny and Pratyay Mukherjee and Sikhar Patranabis and Srinivasan Raghuraman and Pratik Sarkar}, title = {Round-Optimal Oblivious Transfer and {MPC} from Computational {CSIDH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1511}, year = {2022}, url = {https://eprint.iacr.org/2022/1511}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananM22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChowdhurySSMCPM22, author = {Siddhartha Chowdhury and Sayani Sinha and Animesh Singh and Shubham Mishra and Chandan Chaudhary and Sikhar Patranabis and Pratyay Mukherjee and Ayantika Chatterjee and Debdeep Mukhopadhyay}, title = {Efficient Threshold {FHE} with Application to Real-Time Systems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1625}, year = {2022}, url = {https://eprint.iacr.org/2022/1625}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChowdhurySSMCPM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargJMSWZ22, author = {Sanjam Garg and Abhishek Jain and Pratyay Mukherjee and Rohit Sinha and Mingyuan Wang and Yinuo Zhang}, title = {Cryptography with Weights: MPC, Encryption and Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1632}, year = {2022}, url = {https://eprint.iacr.org/2022/1632}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GargJMSWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChristodorescuG21, author = {Mihai Christodorescu and Sivanarayana Gaddam and Pratyay Mukherjee and Rohit Sinha}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Amortized Threshold Symmetric-key Encryption}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {2758--2779}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3485256}, doi = {10.1145/3460120.3485256}, timestamp = {Tue, 16 Nov 2021 12:59:46 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ChristodorescuG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AgrawalBMMP21, author = {Shashank Agrawal and Saikrishna Badrinarayanan and Payman Mohassel and Pratyay Mukherjee and Sikhar Patranabis}, editor = {Juan A. Garay}, title = {{BETA:} Biometric-Enabled Threshold Authentication}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {290--318}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_11}, doi = {10.1007/978-3-030-75248-4\_11}, timestamp = {Fri, 07 May 2021 15:40:46 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AgrawalBMMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananM21, author = {Saikrishna Badrinarayanan and Peihan Miao and Pratyay Mukherjee and Divya Ravi}, title = {On the Round Complexity of Fully Secure Solitary {MPC} with Honest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {241}, year = {2021}, url = {https://eprint.iacr.org/2021/241}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BairdMS21, author = {Leemon Baird and Pratyay Mukherjee and Rohit Sinha}, title = {{TEMP:} Time-locked Encryption Made Practical}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {800}, year = {2021}, url = {https://eprint.iacr.org/2021/800}, timestamp = {Thu, 08 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BairdMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChristodorescuG21, author = {Mihai Christodorescu and Sivanarayana Gaddam and Pratyay Mukherjee and Rohit Sinha}, title = {Amortized Threshold Symmetric-key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1176}, year = {2021}, url = {https://eprint.iacr.org/2021/1176}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChristodorescuG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/FaustMNV20, author = {Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi}, title = {Continuously Non-malleable Codes in the Split-State Model}, journal = {J. Cryptol.}, volume = {33}, number = {4}, pages = {2034--2077}, year = {2020}, url = {https://doi.org/10.1007/s00145-020-09362-z}, doi = {10.1007/S00145-020-09362-Z}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/FaustMNV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AgrawalBMR20, author = {Shashank Agrawal and Saikrishna Badrinarayanan and Pratyay Mukherjee and Peter Rindal}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1351--1370}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417287}, doi = {10.1145/3372297.3417287}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AgrawalBMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Mukherjee20, author = {Pratyay Mukherjee}, editor = {Karthikeyan Bhargavan and Elisabeth Oswald and Manoj Prabhakaran}, title = {Adaptively Secure Threshold Symmetric-Key Encryption}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12578}, pages = {465--487}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65277-7\_21}, doi = {10.1007/978-3-030-65277-7\_21}, timestamp = {Wed, 17 Apr 2024 21:39:19 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Mukherjee20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BartusekGMM20, author = {James Bartusek and Sanjam Garg and Daniel Masny and Pratyay Mukherjee}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Reusable Two-Round {MPC} from {DDH}}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12551}, pages = {320--348}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64378-2\_12}, doi = {10.1007/978-3-030-64378-2\_12}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BartusekGMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BadrinarayananB20, author = {Saikrishna Badrinarayanan and James Bartusek and Sanjam Garg and Daniel Masny and Pratyay Mukherjee}, title = {Reusable Two-Round {MPC} from {DDH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {170}, year = {2020}, url = {https://eprint.iacr.org/2020/170}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BadrinarayananB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalBMMP20, author = {Shashank Agrawal and Saikrishna Badrinarayanan and Payman Mohassel and Pratyay Mukherjee and Sikhar Patranabis}, title = {{BETA:} Biometric Enabled Threshold Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {679}, year = {2020}, url = {https://eprint.iacr.org/2020/679}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalBMMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Mukherjee20, author = {Pratyay Mukherjee}, title = {Adaptively secure Threshold Symmetric-key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1329}, year = {2020}, url = {https://eprint.iacr.org/2020/1329}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Mukherjee20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalBMR20, author = {Shashank Agrawal and Saikrishna Badrinarayanan and Pratyay Mukherjee and Peter Rindal}, title = {Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1363}, year = {2020}, url = {https://eprint.iacr.org/2020/1363}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalBMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ChenGM19, author = {Yilei Chen and Nicholas Genise and Pratyay Mukherjee}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11923}, pages = {3--32}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34618-8\_1}, doi = {10.1007/978-3-030-34618-8\_1}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ChenGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChenCHM19, author = {Binyi Chen and Yilei Chen and Kristina Host{\'{a}}kov{\'{a}} and Pratyay Mukherjee}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Continuous Space-Bounded Non-malleable Codes from Stronger Proofs-of-Space}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {467--495}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_17}, doi = {10.1007/978-3-030-26948-7\_17}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChenCHM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenCHM19, author = {Binyi Chen and Yilei Chen and Kristina Host{\'{a}}kov{\'{a}} and Pratyay Mukherjee}, title = {Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {552}, year = {2019}, url = {https://eprint.iacr.org/2019/552}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenCHM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenGM19, author = {Yilei Chen and Nicholas Genise and Pratyay Mukherjee}, title = {Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1029}, year = {2019}, url = {https://eprint.iacr.org/2019/1029}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AgrawalMMR18, author = {Shashank Agrawal and Payman Mohassel and Pratyay Mukherjee and Peter Rindal}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {DiSE: Distributed Symmetric-key Encryption}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1993--2010}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243774}, doi = {10.1145/3243734.3243774}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AgrawalMMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AgrawalMMM18, author = {Shashank Agrawal and Peihan Miao and Payman Mohassel and Pratyay Mukherjee}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {{PASTA:} PASsword-based Threshold Authentication}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {2042--2059}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243839}, doi = {10.1145/3243734.3243839}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AgrawalMMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/DottlingG0MM18, author = {Nico D{\"{o}}ttling and Sanjam Garg and Divya Gupta and Peihan Miao and Pratyay Mukherjee}, editor = {Debrup Chakraborty and Tetsu Iwata}, title = {Obfuscation from Low Noise Multilinear Maps}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2018 - 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11356}, pages = {329--352}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05378-9\_18}, doi = {10.1007/978-3-030-05378-9\_18}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/DottlingG0MM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalMMR18, author = {Shashank Agrawal and Payman Mohassel and Pratyay Mukherjee and Peter Rindal}, title = {DiSE: Distributed Symmetric-key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {727}, year = {2018}, url = {https://eprint.iacr.org/2018/727}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalMMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalMMM18, author = {Shashank Agrawal and Peihan Miao and Payman Mohassel and Pratyay Mukherjee}, title = {{PASTA:} PASsword-based Threshold Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {885}, year = {2018}, url = {https://eprint.iacr.org/2018/885}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalMMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DamgardFMV17, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, title = {Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier}, journal = {J. Cryptol.}, volume = {30}, number = {1}, pages = {152--190}, year = {2017}, url = {https://doi.org/10.1007/s00145-015-9218-0}, doi = {10.1007/S00145-015-9218-0}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/DamgardFMV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/FaustHM017, author = {Sebastian Faust and Kristina Host{\'{a}}kov{\'{a}} and Pratyay Mukherjee and Daniele Venturi}, editor = {Jonathan Katz and Hovav Shacham}, title = {Non-Malleable Codes for Space-Bounded Tampering}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {95--126}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_4}, doi = {10.1007/978-3-319-63715-0\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/FaustHM017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/AponDGM17, author = {Daniel Apon and Nico D{\"{o}}ttling and Sanjam Garg and Pratyay Mukherjee}, editor = {Ioannis Chatzigiannakis and Piotr Indyk and Fabian Kuhn and Anca Muscholl}, title = {Cryptanalysis of Indistinguishability Obfuscations of Circuits over {GGH13}}, booktitle = {44th International Colloquium on Automata, Languages, and Programming, {ICALP} 2017, July 10-14, 2017, Warsaw, Poland}, series = {LIPIcs}, volume = {80}, pages = {38:1--38:16}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2017}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2017.38}, doi = {10.4230/LIPICS.ICALP.2017.38}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icalp/AponDGM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustHM017, author = {Sebastian Faust and Kristina Host{\'{a}}kov{\'{a}} and Pratyay Mukherjee and Daniele Venturi}, title = {Non-Malleable Codes for Space-Bounded Tampering}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {530}, year = {2017}, url = {http://eprint.iacr.org/2017/530}, timestamp = {Tue, 23 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FaustHM017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/FaustMVW16, author = {Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs}, title = {Efficient Non-Malleable Codes and Key Derivation for Poly-Size Tampering Circuits}, journal = {{IEEE} Trans. Inf. Theory}, volume = {62}, number = {12}, pages = {7179--7194}, year = {2016}, url = {https://doi.org/10.1109/TIT.2016.2613919}, doi = {10.1109/TIT.2016.2613919}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/FaustMVW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargMPP16, author = {Sanjam Garg and Pratyay Mukherjee and Omkant Pandey and Antigoni Polychroniadou}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {The Exact Round Complexity of Secure Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {448--476}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_16}, doi = {10.1007/978-3-662-49896-5\_16}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargMPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MukherjeeW16, author = {Pratyay Mukherjee and Daniel Wichs}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Two Round Multiparty Computation via Multi-key {FHE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {735--763}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_26}, doi = {10.1007/978-3-662-49896-5\_26}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MukherjeeW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/ChandranGMPU16, author = {Nishanth Chandran and Vipul Goyal and Pratyay Mukherjee and Omkant Pandey and Jalaj Upadhyay}, editor = {Ioannis Chatzigiannakis and Michael Mitzenmacher and Yuval Rabani and Davide Sangiorgi}, title = {Block-Wise Non-Malleable Codes}, booktitle = {43rd International Colloquium on Automata, Languages, and Programming, {ICALP} 2016, July 11-15, 2016, Rome, Italy}, series = {LIPIcs}, volume = {55}, pages = {31:1--31:14}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2016}, url = {https://doi.org/10.4230/LIPIcs.ICALP.2016.31}, doi = {10.4230/LIPICS.ICALP.2016.31}, timestamp = {Tue, 11 Feb 2020 15:52:14 +0100}, biburl = {https://dblp.org/rec/conf/icalp/ChandranGMPU16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GargMMSSZ16, author = {Sanjam Garg and Eric Miles and Pratyay Mukherjee and Amit Sahai and Akshayaram Srinivasan and Mark Zhandry}, editor = {Martin Hirt and Adam D. Smith}, title = {Secure Obfuscation in a Weak Multilinear Map Model}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {241--268}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_10}, doi = {10.1007/978-3-662-53644-5\_10}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GargMMSSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargMPP16, author = {Sanjam Garg and Pratyay Mukherjee and Omkant Pandey and Antigoni Polychroniadou}, title = {The Exact Round Complexity of Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {252}, year = {2016}, url = {http://eprint.iacr.org/2016/252}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargMPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargMS16, author = {Sanjam Garg and Pratyay Mukherjee and Akshayaram Srinivasan}, title = {Obfuscation without the Vulnerabilities of Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {390}, year = {2016}, url = {http://eprint.iacr.org/2016/390}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargMS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingG0MM16, author = {Nico D{\"{o}}ttling and Sanjam Garg and Divya Gupta and Peihan Miao and Pratyay Mukherjee}, title = {Obfuscation from Low Noise Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {599}, year = {2016}, url = {http://eprint.iacr.org/2016/599}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingG0MM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargMMSSZ16, author = {Sanjam Garg and Eric Miles and Pratyay Mukherjee and Amit Sahai and Akshayaram Srinivasan and Mark Zhandry}, title = {Secure Obfuscation in a Weak Multilinear Map Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {817}, year = {2016}, url = {http://eprint.iacr.org/2016/817}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargMMSSZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AponDGM16, author = {Daniel Apon and Nico D{\"{o}}ttling and Sanjam Garg and Pratyay Mukherjee}, title = {Cryptanalysis of Indistinguishability Obfuscations of Circuits over {GGH13}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1003}, year = {2016}, url = {http://eprint.iacr.org/2016/1003}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AponDGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/BhattacharyyaM15, author = {Rishiraj Bhattacharyya and Pratyay Mukherjee}, title = {Non-adaptive programmability of random oracle}, journal = {Theor. Comput. Sci.}, volume = {592}, pages = {97--114}, year = {2015}, url = {https://doi.org/10.1016/j.tcs.2015.05.026}, doi = {10.1016/J.TCS.2015.05.026}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/BhattacharyyaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DamgardFMV15, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, editor = {Anja Lehmann and Stefan Wolf}, title = {The Chaining Lemma and Its Application}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {181--196}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_11}, doi = {10.1007/978-3-319-17470-9\_11}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/DamgardFMV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FaustMNV15, author = {Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi}, editor = {Jonathan Katz}, title = {A Tamper and Leakage Resilient von Neumann Architecture}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {579--603}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_26}, doi = {10.1007/978-3-662-46447-2\_26}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/FaustMNV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranGMPU15, author = {Nishanth Chandran and Vipul Goyal and Pratyay Mukherjee and Omkant Pandey and Jalaj Upadhyay}, title = {Block-wise Non-Malleable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {129}, year = {2015}, url = {http://eprint.iacr.org/2015/129}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranGMPU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MukherjeeW15, author = {Pratyay Mukherjee and Daniel Wichs}, title = {Two Round {MPC} from {LWE} via Multi-Key {FHE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {345}, year = {2015}, url = {http://eprint.iacr.org/2015/345}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MukherjeeW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FaustMVW14, author = {Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {111--128}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_7}, doi = {10.1007/978-3-642-55220-5\_7}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FaustMVW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/FaustMNV14, author = {Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi}, editor = {Yehuda Lindell}, title = {Continuous Non-malleable Codes}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {465--488}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_20}, doi = {10.1007/978-3-642-54242-8\_20}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/FaustMNV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustMNV14, author = {Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi}, title = {Continuous Non-malleable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2014}, url = {http://eprint.iacr.org/2014/173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustMNV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustMNV14a, author = {Sebastian Faust and Pratyay Mukherjee and Jesper Buus Nielsen and Daniele Venturi}, title = {A Tamper and Leakage Resilient Random Access Machine}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {338}, year = {2014}, url = {http://eprint.iacr.org/2014/338}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustMNV14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardFMV14, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, title = {The Chaining Lemma and its application}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {979}, year = {2014}, url = {http://eprint.iacr.org/2014/979}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardFMV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/DamgardFMV13, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, editor = {Kazue Sako and Palash Sarkar}, title = {Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8270}, pages = {140--160}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42045-0\_8}, doi = {10.1007/978-3-642-42045-0\_8}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/DamgardFMV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgardFMV13a, author = {Ivan Damg{\aa}rd and Sebastian Faust and Pratyay Mukherjee and Daniele Venturi}, title = {Bounded Tamper Resilience: How to go beyond the Algebraic Barrier}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {677}, year = {2013}, url = {http://eprint.iacr.org/2013/677}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgardFMV13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FaustMVW13, author = {Sebastian Faust and Pratyay Mukherjee and Daniele Venturi and Daniel Wichs}, title = {Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {702}, year = {2013}, url = {http://eprint.iacr.org/2013/702}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FaustMVW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.