Nishanth Chandran

From MaRDI portal
Person:901365

Available identifiers

zbMath Open chandran.nishanthMaRDI QIDQ901365

List of research outcomes





PublicationDate of PublicationType
Universally composable almost-everywhere secure computation2024-06-25Paper
Short leakage resilient and non-malleable secret sharing schemes2023-06-12Paper
Adaptive extractors and their application to leakage resilient secret sharing2022-04-22Paper
Function secret sharing for mixed-mode and fixed-point secure computation2021-12-08Paper
Universally composable secure computation with corrupted tokens2020-03-09Paper
Improved algorithms for optimal embeddings2018-11-05Paper
https://portal.mardi4nfdi.de/entity/Q46380572018-05-03Paper
Block-wise non-malleable codes2017-12-19Paper
The hidden graph model: communication locality and optimal resiliency with adaptive faults2017-05-19Paper
Reducing depth in constrained PRFs: from bit-fixing to \(\mathbf {NC}^{1}\)2016-04-13Paper
Information-Theoretic Local Non-malleable Codes and Their Applications2016-04-08Paper
Almost-everywhere secure computation with edge corruptions2016-01-11Paper
Balancing output length and query bound in hardness preserving constructions of pseudorandom functions2015-09-10Paper
Privacy amplification with asymptotically optimal entropy loss2015-08-14Paper
Position-based cryptography2014-11-14Paper
Privacy amplification with asymptotically optimal entropy loss2014-08-13Paper
Position-based quantum cryptography: impossibility and constructions2014-06-04Paper
Achieving privacy in verifiable computation with multiple servers -- without FHE and without pre-processing2014-03-25Paper
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices2014-03-25Paper
Locally updatable and locally decodable codes2014-02-18Paper
Edge Fault Tolerance on Sparse Networks2012-11-01Paper
Functional Re-encryption and Collusion-Resistant Obfuscation2012-06-15Paper
Position-based quantum cryptography: impossibility and constructions2011-08-12Paper
Public-Key Encryption with Efficient Amortized Updates2010-09-10Paper
Improved fault tolerance and secure computation on sparse networks2010-09-07Paper
Position Based Cryptography2009-10-20Paper
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks2009-05-12Paper
New Constructions for UC Secure Computation Using Tamper-Proof Hardware2008-04-15Paper
Ring Signatures of Sub-linear Size Without Random Oracles2007-11-28Paper

Research outcomes over time

This page was built for person: Nishanth Chandran