Akshay Wadia

From MaRDI portal
(Redirected from Person:332267)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Two-message witness indistinguishability and secure computation in the plain model from new assumptions2018-02-23Paper
Private interactive communication across an adversarial channel
Proceedings of the 5th conference on Innovations in theoretical computer science
2017-05-19Paper
Private Interactive Communication Across an Adversarial Channel
IEEE Transactions on Information Theory
2017-04-28Paper
A counterexample to the chain rule for conditional HILL entropy
Computational Complexity
2016-10-28Paper
Secure computation using leaky tokens
Automata, Languages, and Programming
2014-07-01Paper
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Cryptography using \texttt{CAPTCHA} puzzles
Public-Key Cryptography – PKC 2013
2013-04-19Paper
A counterexample to the chain rule for conditional HILL entropy. And what deniable encryption has to do with it
Theory of Cryptography
2013-03-18Paper
Resettable statistical zero knowledge
Theory of Cryptography
2012-06-15Paper
Founding Cryptography on Tamper-Proof Hardware Tokens
Theory of Cryptography
2010-02-24Paper


Research outcomes over time


This page was built for person: Akshay Wadia