| Publication | Date of Publication | Type |
|---|
| Perfect asynchronous MPC with linear communication overhead | 2024-11-13 | Paper |
| The round complexity of statistical MPC with optimal resiliency | 2024-05-08 | Paper |
| Detect, pack and batch: perfectly-secure MPC with linear communication and constant expected time | 2023-12-08 | Paper |
| Attaining GOD beyond honest majority with friends and foes | 2023-08-25 | Paper |
| Fully-secure MPC with minimal trust | 2023-08-14 | Paper |
| On perfectly secure two-party computation for symmetric functionalities with correlated randomness | 2023-08-14 | Paper |
| Asymptotically free broadcast in constant expected time via packed VSS | 2023-08-14 | Paper |
| Round-optimal honest-majority MPC in Minicrypt and with everlasting security (extended abstract) | 2023-08-14 | Paper |
| Beyond honest majority: the round complexity of fair and robust multi-party computation | 2023-07-26 | Paper |
| Verifiable relation sharing and multi-verifier zero-knowledge in two rounds: trading NIZKs with honest majority (extended abstract) | 2023-07-07 | Paper |
| Quadratic multiparty randomized encodings beyond honest majority and their applications | 2023-07-07 | Paper |
| MPClan: protocol suite for privacy-conscious computations | 2023-07-05 | Paper |
| On the communication efficiency of statistically secure asynchronous MPC with optimal resilience | 2023-04-13 | Paper |
| On the exact round complexity of best-of-both-worlds multi-party computation | 2023-03-29 | Paper |
| Three-round secure multiparty computation from black-box two-round oblivious transfer | 2022-04-22 | Paper |
| The resiliency of MPC with low interaction: the benefit of making errors (extended abstract) | 2022-03-23 | Paper |
| On the exact round complexity of secure three-party computation | 2021-09-10 | Paper |
| Optimal extension protocols for Byzantine broadcast and agreement | 2021-03-12 | Paper |
| The Power of Shunning | 2020-11-11 | Paper |
| Beyond honest majority: the round complexity of fair and robust multi-party computation | 2020-05-20 | Paper |
| Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited | 2019-09-19 | Paper |
| Crash-tolerant consensus in directed graph revisited (extended abstract) | 2019-01-30 | Paper |
| On the exact round complexity of secure three-party computation | 2018-09-26 | Paper |
| On the Power of Hybrid Networks in Multi-Party Computation | 2018-09-14 | Paper |
| Efficient adaptively secure zero-knowledge from garbled circuits | 2018-05-29 | Paper |
| Round and communication efficient unconditionally-secure MPC with \(t<n/3\) in partially synchronous network | 2018-03-16 | Paper |
| Privacy-free garbled circuits for formulas: size zero and information-theoretic | 2017-11-03 | Paper |
| Broadcast Extensions with Optimal Communication and Round Complexity | 2017-09-29 | Paper |
| An Efficient Framework for Unconditionally Secure Multiparty Computation | 2017-05-02 | Paper |
| Efficient one-sided adaptively secure computation | 2017-03-02 | Paper |
| Linear Overhead Optimally-Resilient Robust MPC Using Preprocessing | 2016-10-21 | Paper |
| Selective Opening Security for Receivers | 2016-06-10 | Paper |
| Adaptively secure computation with partial erasures | 2016-03-23 | Paper |
| Anonymous Authentication with Shared Secrets | 2015-09-17 | Paper |
| Efficient asynchronous verifiable secret sharing and multiparty computation | 2015-03-25 | Paper |
| Brief announcement | 2015-03-02 | Paper |
| On tradeoff between network connectivity, phase complexity and communication complexity of reliable communication tolerating mixed adversary | 2014-12-12 | Paper |
| Efficient single phase unconditionally secure message transmission with optimum communication complexity | 2014-12-12 | Paper |
| Brief announcement | 2014-12-05 | Paper |
| Reducing the Overhead of MPC over a Large Population | 2014-10-14 | Paper |
| Key-Indistinguishable Message Authentication Codes | 2014-10-14 | Paper |
| Simple and efficient asynchronous byzantine agreement with optimal resilience | 2014-07-23 | Paper |
| Asynchronous Byzantine agreement with optimal resilience | 2014-07-11 | Paper |
| Constant phase efficient protocols for secure message transmission in directed networks | 2014-03-13 | Paper |
| One-Sided Adaptively Secure Two-Party Computation | 2014-02-18 | Paper |
| On the trade-off between network connectivity, round complexity, and communication complexity of reliable message transmission | 2014-02-17 | Paper |
| Between a Rock and a Hard Place: Interpolating between MPC and FHE | 2013-12-10 | Paper |
| On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks | 2012-11-01 | Paper |
| Computational Verifiable Secret Sharing Revisited | 2011-12-02 | Paper |
| Secure message transmission in asynchronous networks | 2011-08-19 | Paper |
| Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary | 2011-06-28 | Paper |
| Communication Optimal Multi-valued Asynchronous Byzantine Agreement with Optimal Resilience | 2011-05-19 | Paper |
| The Round Complexity of Perfectly Secure General VSS | 2011-05-19 | Paper |
| Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality | 2011-04-05 | Paper |
| The Round Complexity of Verifiable Secret Sharing: The Statistical Case | 2010-12-07 | Paper |
| Communication Efficient Statistical Asynchronous Multiparty Computation with Optimal Resilience | 2010-11-23 | Paper |
| Efficient Statistical Asynchronous Verifiable Secret Sharing with Optimal Resilience | 2010-09-29 | Paper |
| Communication Optimal Multi-valued Asynchronous Broadcast Protocol | 2010-08-31 | Paper |
| Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience | 2010-05-04 | Paper |
| Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience | 2009-12-17 | Paper |
| Information Theoretically Secure Multi Party Set Intersection Re-visited | 2009-12-09 | Paper |
| Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security | 2009-11-26 | Paper |
| The Round Complexity of Verifiable Secret Sharing Revisited | 2009-10-20 | Paper |
| Indoor versus outdoor scene classification using probabilistic neural network | 2009-09-01 | Paper |
| Perfectly reliable and secure message transmission tolerating mobile adversary | 2009-05-12 | Paper |
| On Minimal Connectivity Requirement for Secure Message Transmission in Asynchronous Networks | 2009-03-26 | Paper |
| Round Efficient Unconditionally Secure Multiparty Computation Protocol | 2009-01-22 | Paper |
| Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary | 2009-01-09 | Paper |
| Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited | 2008-11-20 | Paper |
| Perfectly Reliable and Secure Communication in Directed Networks Tolerating Mixed Adversary | 2008-09-02 | Paper |
| Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary | 2008-07-08 | Paper |
| Enhancing decision combination of face and fingerprint by exploitation of individual classifier space: An approach to multi-modal biometry | 2008-05-09 | Paper |
| Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary | 2008-04-15 | Paper |
| Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission | 2008-04-11 | Paper |
| Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality | 2008-04-11 | Paper |