Hemanta K. Maji

From MaRDI portal
Person:1631314

Available identifiers

zbMath Open maji.hemanta-kMaRDI QIDQ1631314

List of research outcomes

PublicationDate of PublicationType
Leakage-resilient linear secret-sharing against arbitrary bounded-size leakage family2023-08-14Paper
Secure non-interactive simulation from arbitrary joint distributions2023-08-14Paper
https://portal.mardi4nfdi.de/entity/Q61072682023-07-03Paper
The chromatic number of squares of random graphs2023-04-19Paper
Black-box use of one-way functions is useless for optimal fair coin-tossing2022-11-09Paper
Secure non-interactive simulation: feasibility and rate2022-08-30Paper
Computational hardness of optimal fair computation: beyond Minicrypt2022-04-22Paper
Constructing locally leakage-resilient linear secret-sharing schemes2022-04-22Paper
Leakage-resilience of the Shamir secret-sharing scheme against physical-bit leakages2021-12-08Paper
Explicit rate-1 non-malleable codes for local tampering2020-05-20Paper
Estimating gaps in martingales and applications to coin-tossing: constructions and hardness2020-04-30Paper
Non-malleable codes against lookahead tampering2019-03-29Paper
Secure computation with constant communication overhead using multiplication embeddings2019-03-29Paper
Secure computation using leaky correlations (asymptotically optimal constructions)2018-12-06Paper
Secure computation based on leaky correlations: high resilience setting2017-11-15Paper
Limits of random oracles in secure computation2017-05-19Paper
Secure Computation from Elastic Noisy Channels2016-07-15Paper
All Complete Functionalities are Reversible2016-07-15Paper
Optimal Computational Split-state Non-malleable Codes2016-04-08Paper
Secure Computation from Leaky Correlated Randomness2015-12-10Paper
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations2015-12-10Paper
Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations2015-12-10Paper
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations2015-07-06Paper
Black-Box Separations for Differentially Private Protocols2015-01-06Paper
A Unified Characterization of Completeness and Triviality for Secure Function Evaluation2014-08-20Paper
Stateless Cryptographic Protocols2014-07-30Paper
A Full Characterization of Completeness for Two-Party Randomized Function Evaluation2014-05-27Paper
On the Power of Public-Key Encryption in Secure Computation2014-02-18Paper
The Limits of Common Coins: Further Results2011-12-16Paper
Exploring the Limits of Common Coins Using Frontier Analysis of Protocols2011-05-19Paper
Attribute-Based Signatures2011-02-11Paper
A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security2010-08-24Paper
Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation2009-03-03Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Hemanta K. Maji