Akshay Wadia

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Two-message witness indistinguishability and secure computation in the plain model from new assumptions2018-02-23Paper
Private interactive communication across an adversarial channel
Proceedings of the 5th conference on Innovations in theoretical computer science
2017-05-19Paper
Private Interactive Communication Across an Adversarial Channel
IEEE Transactions on Information Theory
2017-04-28Paper
A counterexample to the chain rule for conditional HILL entropy
Computational Complexity
2016-10-28Paper
Secure computation using leaky tokens
Automata, Languages, and Programming
2014-07-01Paper
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Cryptography using \texttt{CAPTCHA} puzzles
Public-Key Cryptography – PKC 2013
2013-04-19Paper
A counterexample to the chain rule for conditional HILL entropy. And what deniable encryption has to do with it
Theory of Cryptography
2013-03-18Paper
Resettable statistical zero knowledge
Theory of Cryptography
2012-06-15Paper
Founding Cryptography on Tamper-Proof Hardware Tokens
Theory of Cryptography
2010-02-24Paper


Research outcomes over time


This page was built for person: Akshay Wadia