Nishanth Chandran

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Universally composable almost-everywhere secure computation2024-06-25Paper
Short leakage resilient and non-malleable secret sharing schemes
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
Adaptive extractors and their application to leakage resilient secret sharing2022-04-22Paper
Function secret sharing for mixed-mode and fixed-point secure computation2021-12-08Paper
Universally composable secure computation with corrupted tokens2020-03-09Paper
Improved algorithms for optimal embeddings
ACM Transactions on Algorithms
2018-11-05Paper
scientific article; zbMATH DE number 6866298 (Why is no real title available?)2018-05-03Paper
Block-wise non-malleable codes2017-12-19Paper
The hidden graph model: communication locality and optimal resiliency with adaptive faults
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science
2017-05-19Paper
Reducing depth in constrained PRFs: from bit-fixing to \(\mathbf {NC}^{1}\)
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Information-Theoretic Local Non-malleable Codes and Their Applications
Theory of Cryptography
2016-04-08Paper
Almost-everywhere secure computation with edge corruptions
Journal of Cryptology
2016-01-11Paper
Balancing output length and query bound in hardness preserving constructions of pseudorandom functions
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Privacy amplification with asymptotically optimal entropy loss
Journal of the ACM
2015-08-14Paper
Position-based cryptography
SIAM Journal on Computing
2014-11-14Paper
Privacy amplification with asymptotically optimal entropy loss
Proceedings of the forty-second ACM symposium on Theory of computing
2014-08-13Paper
Position-based quantum cryptography: impossibility and constructions
SIAM Journal on Computing
2014-06-04Paper
Achieving privacy in verifiable computation with multiple servers -- without FHE and without pre-processing
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Locally updatable and locally decodable codes
Theory of Cryptography
2014-02-18Paper
Edge Fault Tolerance on Sparse Networks
Automata, Languages, and Programming
2012-11-01Paper
Functional Re-encryption and Collusion-Resistant Obfuscation
Theory of Cryptography
2012-06-15Paper
Position-based quantum cryptography: impossibility and constructions
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Public-Key Encryption with Efficient Amortized Updates
Lecture Notes in Computer Science
2010-09-10Paper
Improved fault tolerance and secure computation on sparse networks
Automata, Languages and Programming
2010-09-07Paper
Position Based Cryptography
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
New Constructions for UC Secure Computation Using Tamper-Proof Hardware
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Ring Signatures of Sub-linear Size Without Random Oracles
Automata, Languages and Programming
2007-11-28Paper


Research outcomes over time


This page was built for person: Nishanth Chandran