Nishanth Chandran

From MaRDI portal
Person:901365

Available identifiers

zbMath Open chandran.nishanthMaRDI QIDQ901365

List of research outcomes

PublicationDate of PublicationType
Short leakage resilient and non-malleable secret sharing schemes2023-06-12Paper
Adaptive extractors and their application to leakage resilient secret sharing2022-04-22Paper
Function secret sharing for mixed-mode and fixed-point secure computation2021-12-08Paper
Universally composable secure computation with corrupted tokens2020-03-09Paper
Improved algorithms for optimal embeddings2018-11-05Paper
https://portal.mardi4nfdi.de/entity/Q46380572018-05-03Paper
https://portal.mardi4nfdi.de/entity/Q45981672017-12-19Paper
The Hidden Graph Model2017-05-19Paper
Reducing Depth in Constrained PRFs: From Bit-Fixing to $$\mathbf {NC}^{1}$$2016-04-13Paper
Information-Theoretic Local Non-malleable Codes and Their Applications2016-04-08Paper
Almost-everywhere secure computation with edge corruptions2016-01-11Paper
Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions2015-09-10Paper
Privacy amplification with asymptotically optimal entropy loss2015-08-14Paper
Position-Based Cryptography2014-11-14Paper
Privacy amplification with asymptotically optimal entropy loss2014-08-13Paper
Position-Based Quantum Cryptography: Impossibility and Constructions2014-06-04Paper
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices2014-03-25Paper
Achieving Privacy in Verifiable Computation with Multiple Servers – Without FHE and without Pre-processing2014-03-25Paper
Locally Updatable and Locally Decodable Codes2014-02-18Paper
Edge Fault Tolerance on Sparse Networks2012-11-01Paper
Functional Re-encryption and Collusion-Resistant Obfuscation2012-06-15Paper
Position-Based Quantum Cryptography: Impossibility and Constructions2011-08-12Paper
Public-Key Encryption with Efficient Amortized Updates2010-09-10Paper
Improved Fault Tolerance and Secure Computation on Sparse Networks2010-09-07Paper
Position Based Cryptography2009-10-20Paper
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks2009-05-12Paper
New Constructions for UC Secure Computation Using Tamper-Proof Hardware2008-04-15Paper
Ring Signatures of Sub-linear Size Without Random Oracles2007-11-28Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Nishanth Chandran