Folgen
Manoj Prabhakaran
Manoj Prabhakaran
Computer Science and Engineering, IIT Bombay
Bestätigte E-Mail-Adresse bei cse.iitb.ac.in
Titel
Zitiert von
Zitiert von
Jahr
Attribute-based signatures
H Maji, M Prabhakaran, M Rosulek
Topics in Cryptology–CT-RSA 2011, 376-392, 2011
7942011
Founding cryptography on oblivious transfer–efficiently
Y Ishai, M Prabhakaran, A Sahai
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
6092008
The smallest grammar problem
M Charikar, E Lehman, D Liu, R Panigrahy, M Prabhakaran, A Sahai, ...
Information Theory, IEEE Transactions on 51 (7), 2554-2576, 2005
548*2005
Dynamic searchable encryption via blind storage
M Naveed, M Prabhakaran, CA Gunter
2014 IEEE Symposium on Security and Privacy, 639-654, 2014
4172014
Positive results and techniques for obfuscation
B Lynn, M Prabhakaran, A Sahai
International conference on the theory and applications of cryptographic …, 2004
3532004
Concurrent zero knowledge with logarithmic round-complexity
M Prabhakaran, A Rosen, A Sahai
Foundations of Computer Science, 2002. Proceedings. The 43rd Annual IEEE …, 2002
2492002
Attribute-sets: A practically motivated enhancement to attribute-based encryption
R Bobba, H Khurana, M Prabhakaran
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
2342009
Private circuits II: Keeping secrets in tamperable circuits
Y Ishai, M Prabhakaran, A Sahai, D Wagner
Annual International Conference on the Theory and Applications of …, 2006
2152006
New notions of security: achieving universal composability without trusted setup
M Prabhakaran, A Sahai
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing …, 2004
1812004
Secure arithmetic computation with no honest majority
Y Ishai, M Prabhakaran, A Sahai
Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San …, 2009
1782009
Efficient non-interactive secure computation
Y Ishai, E Kushilevitz, R Ostrovsky, M Prabhakaran, A Sahai
Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011
1722011
Circuits resilient to additive attacks with applications to secure computation
D Genkin, Y Ishai, MM Prabhakaran, A Sahai, E Tromer
Proceedings of the forty-sixth annual ACM symposium on Theory of computing …, 2014
1352014
On the (im) possibility of cryptography with imperfect randomness
Y Dodis, SJ Ong, M Prabhakaran, A Sahai
45th Annual IEEE Symposium on Foundations of Computer Science, 196-205, 2004
1302004
Resource fairness and composability of cryptographic protocols
J Garay, P MacKenzie, M Prabhakaran, K Yang
Theory of Cryptography Conference, 404-428, 2006
127*2006
Concurrent non-malleable zero knowledge
B Barak, M Prabhakaran, A Sahai
2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06 …, 2006
1042006
Rerandomizable RCCA encryption
M Prabhakaran, M Rosulek
Annual International Cryptology Conference, 517-534, 2007
962007
Concurrent general composition of secure protocols in the timing model
YT Kalai, Y Lindell, M Prabhakaran
Proceedings of the thirty-seventh annual ACM Symposium on Theory of …, 2005
88*2005
Controlled functional encryption
M Naveed, S Agrawal, M Prabhakaran, XF Wang, E Ayday, JP Hubaux, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
822014
A rate-optimizing compiler for non-malleable codes against bit-wise tampering and permutations
S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
762015
Secure multi-party computation
MM Prabhakaran, A Sahai
IOS press, 2013
762013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20