Manoj Prabhakaran

From MaRDI portal
Person:656918

Available identifiers

zbMath Open prabhakaran.manoj-mMaRDI QIDQ656918

List of research outcomes





PublicationDate of PublicationType
Malicious security for SCALES. Outsourced computation with ephemeral servers2024-12-13Paper
R3PO: reach-restricted reactive program obfuscation and its applications2024-11-12Paper
CASE: a new frontier in public-key authenticated encryption2024-08-02Paper
A map of witness maps: new definitions and connections2023-11-16Paper
Oblivious-transfer complexity of noisy coin-toss via secure zero communication reductions2023-08-14Paper
Secure non-interactive reducibility is decidable2023-08-14Paper
SCALES. MPC with small clients and larger ephemeral servers2023-08-14Paper
Group Structure in Correlations and Its Applications in Cryptography.2023-07-03Paper
On communication models and best-achievable security in two-round MPC2023-04-13Paper
Cryptography from one-way communication: on completeness of finite channels2023-03-29Paper
Witness maps and applications2022-10-13Paper
COA-secure obfuscation and applications2022-08-30Paper
Secure non-interactive reduction and spectral analysis of correlations2022-08-30Paper
Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration2022-04-22Paper
Zero-communication reductions2022-03-23Paper
Brief announcement: On secure m-party computation, commuting permutation systems and unassisted non-interactive MPC2021-07-28Paper
The bottleneck complexity of secure multiparty computation2021-07-28Paper
Optimality of a protocol by Feige-Kilian-Naor for three-party secure computation2020-05-12Paper
Uncovering algebraic structures in the MPC landscape2020-02-06Paper
Towards characterizing securely computable two-party randomized functions2018-05-16Paper
Rényi information complexity and an information theoretic characterization of the partition bound2017-12-19Paper
Reconciling non-malleability with homomorphic encryption2017-10-12Paper
Limits of random oracles in secure computation (extended abstract)2017-05-19Paper
Assisted Common Information With an Application to Secure Two-Party Sampling2017-05-16Paper
Communication and Randomness Lower Bounds for Secure Computation2017-04-28Paper
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents2016-12-22Paper
Secure protocol transformations2016-10-27Paper
All complete functionalities are reversible2016-07-15Paper
Optimal computational split-state non-malleable codes2016-04-08Paper
Explicit non-malleable codes against bit-wise tampering and permutations2015-12-10Paper
Cryptographic agents: towards a unified theory of computing on encrypted data2015-09-30Paper
On the practical security of inner product functional encryption2015-08-27Paper
A rate-optimizing compiler for non-malleable codes against bit-wise tampering and permutations2015-07-06Paper
Obfuscation-based non-black-box simulation and four message concurrent zero knowledge for NP2015-07-06Paper
Circuits resilient to additive attacks with applications to secure computation2015-06-26Paper
A unified characterization of completeness and triviality for secure function evaluation2014-08-20Paper
On the communication complexity of secure computation2014-08-07Paper
Secure computation using leaky tokens2014-07-01Paper
A Full Characterization of Completeness for Two-Party Randomized Function Evaluation2014-05-27Paper
On the power of public-key encryption in secure computation2014-02-18Paper
Lower Bounds in the Hardware Token Model2014-02-18Paper
On fair exchange, fair coins and fair sampling2013-09-02Paper
Robust pseudorandom generators2013-08-06Paper
New impossibility results for concurrent composition and a non-interactive completeness theorem for secure computation2012-09-25Paper
Resource fairness and composability of cryptographic protocols2012-01-13Paper
The limits of common coins: further results2011-12-16Paper
Constant-rate oblivious transfer from noisy channels2011-08-12Paper
Efficient non-interactive secure computation2011-05-27Paper
Exploring the limits of common coins using frontier analysis of protocols2011-05-19Paper
Attribute-based signatures2011-02-11Paper
A zero-one law for cryptographic complexity with respect to computational UC security2010-08-24Paper
Concurrent general composition of secure protocols in the timing model2010-08-16Paper
New notions of security: achieving universal composability without trusted setup2010-08-15Paper
Approximating the smallest grammar2010-08-05Paper
Statistically Hiding Sets2009-04-29Paper
Rerandomizable RCCA Encryption2009-03-10Paper
Secure Arithmetic Computation with No Honest Majority2009-03-03Paper
Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation2009-03-03Paper
Founding Cryptography on Oblivious Transfer – Efficiently2009-02-10Paper
Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations2009-02-10Paper
Towards Robust Computation on Encrypted Data2009-02-10Paper
The Smallest Grammar Problem2008-12-21Paper
Homomorphic Encryption with CCA Security2008-08-19Paper
Concurrent composition of secure protocols in the timing model2007-12-06Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Private Circuits II: Keeping Secrets in Tamperable Circuits2007-09-24Paper
Theory of Cryptography2007-02-12Paper
Theory of Cryptography2005-12-07Paper
https://portal.mardi4nfdi.de/entity/Q48086542004-08-12Paper

Research outcomes over time

This page was built for person: Manoj Prabhakaran