Manoj Prabhakaran

From MaRDI portal
Person:656918

Available identifiers

zbMath Open prabhakaran.manoj-mMaRDI QIDQ656918

List of research outcomes





PublicationDate of PublicationType
Malicious security for SCALES. Outsourced computation with ephemeral servers2024-12-13Paper
R3PO: reach-restricted reactive program obfuscation and its applications2024-11-12Paper
CASE: a new frontier in public-key authenticated encryption2024-08-02Paper
A map of witness maps: new definitions and connections2023-11-16Paper
Oblivious-transfer complexity of noisy coin-toss via secure zero communication reductions2023-08-14Paper
Secure non-interactive reducibility is decidable2023-08-14Paper
SCALES. MPC with small clients and larger ephemeral servers2023-08-14Paper
Group Structure in Correlations and Its Applications in Cryptography.2023-07-03Paper
On communication models and best-achievable security in two-round MPC2023-04-13Paper
Cryptography from one-way communication: on completeness of finite channels2023-03-29Paper
Witness Maps and Applications2022-10-13Paper
COA-secure obfuscation and applications2022-08-30Paper
Secure non-interactive reduction and spectral analysis of correlations2022-08-30Paper
Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration2022-04-22Paper
Zero-communication reductions2022-03-23Paper
Brief announcement: On secure m-party computation, commuting permutation systems and unassisted non-interactive MPC2021-07-28Paper
https://portal.mardi4nfdi.de/entity/Q50026942021-07-28Paper
Optimality of a protocol by Feige-Kilian-Naor for three-party secure computation2020-05-12Paper
Uncovering algebraic structures in the MPC landscape2020-02-06Paper
Towards characterizing securely computable two-party randomized functions2018-05-16Paper
R\'enyi Information Complexity and an Information Theoretic Characterization of the Partition Bound2017-12-19Paper
Reconciling non-malleability with homomorphic encryption2017-10-12Paper
Limits of random oracles in secure computation2017-05-19Paper
Assisted Common Information With an Application to Secure Two-Party Sampling2017-05-16Paper
Communication and Randomness Lower Bounds for Secure Computation2017-04-28Paper
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents2016-12-22Paper
Secure Protocol Transformations2016-10-27Paper
All Complete Functionalities are Reversible2016-07-15Paper
Optimal Computational Split-state Non-malleable Codes2016-04-08Paper
Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations2015-12-10Paper
Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data2015-09-30Paper
On the Practical Security of Inner Product Functional Encryption2015-08-27Paper
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations2015-07-06Paper
Obfuscation-Based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP2015-07-06Paper
Circuits resilient to additive attacks with applications to secure computation2015-06-26Paper
A Unified Characterization of Completeness and Triviality for Secure Function Evaluation2014-08-20Paper
On the Communication Complexity of Secure Computation2014-08-07Paper
Secure Computation Using Leaky Tokens2014-07-01Paper
A Full Characterization of Completeness for Two-Party Randomized Function Evaluation2014-05-27Paper
On the Power of Public-Key Encryption in Secure Computation2014-02-18Paper
Lower Bounds in the Hardware Token Model2014-02-18Paper
On Fair Exchange, Fair Coins and Fair Sampling2013-09-02Paper
Robust Pseudorandom Generators2013-08-06Paper
New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation2012-09-25Paper
Resource fairness and composability of cryptographic protocols2012-01-13Paper
The Limits of Common Coins: Further Results2011-12-16Paper
Constant-Rate Oblivious Transfer from Noisy Channels2011-08-12Paper
Efficient Non-interactive Secure Computation2011-05-27Paper
Exploring the Limits of Common Coins Using Frontier Analysis of Protocols2011-05-19Paper
Attribute-Based Signatures2011-02-11Paper
A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security2010-08-24Paper
Concurrent general composition of secure protocols in the timing model2010-08-16Paper
New notions of security2010-08-15Paper
Approximating the smallest grammar2010-08-05Paper
Statistically Hiding Sets2009-04-29Paper
Rerandomizable RCCA Encryption2009-03-10Paper
Secure Arithmetic Computation with No Honest Majority2009-03-03Paper
Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation2009-03-03Paper
Founding Cryptography on Oblivious Transfer – Efficiently2009-02-10Paper
Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations2009-02-10Paper
Towards Robust Computation on Encrypted Data2009-02-10Paper
The Smallest Grammar Problem2008-12-21Paper
Homomorphic Encryption with CCA Security2008-08-19Paper
Concurrent composition of secure protocols in the timing model2007-12-06Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Private Circuits II: Keeping Secrets in Tamperable Circuits2007-09-24Paper
Theory of Cryptography2007-02-12Paper
Theory of Cryptography2005-12-07Paper
https://portal.mardi4nfdi.de/entity/Q48086542004-08-12Paper

Research outcomes over time

This page was built for person: Manoj Prabhakaran