Nishanth Chandran

From MaRDI portal
Person:901365

Available identifiers

zbMath Open chandran.nishanthMaRDI QIDQ901365

List of research outcomes





PublicationDate of PublicationType
Universally composable almost-everywhere secure computation2024-06-25Paper
Short leakage resilient and non-malleable secret sharing schemes2023-06-12Paper
Adaptive extractors and their application to leakage resilient secret sharing2022-04-22Paper
Function secret sharing for mixed-mode and fixed-point secure computation2021-12-08Paper
Universally composable secure computation with corrupted tokens2020-03-09Paper
Improved algorithms for optimal embeddings2018-11-05Paper
https://portal.mardi4nfdi.de/entity/Q46380572018-05-03Paper
https://portal.mardi4nfdi.de/entity/Q45981672017-12-19Paper
The Hidden Graph Model2017-05-19Paper
Reducing Depth in Constrained PRFs: From Bit-Fixing to $$\mathbf {NC}^{1}$$2016-04-13Paper
Information-Theoretic Local Non-malleable Codes and Their Applications2016-04-08Paper
Almost-everywhere secure computation with edge corruptions2016-01-11Paper
Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions2015-09-10Paper
Privacy amplification with asymptotically optimal entropy loss2015-08-14Paper
Position-based cryptography2014-11-14Paper
Privacy amplification with asymptotically optimal entropy loss2014-08-13Paper
Position-Based Quantum Cryptography: Impossibility and Constructions2014-06-04Paper
Achieving Privacy in Verifiable Computation with Multiple Servers – Without FHE and without Pre-processing2014-03-25Paper
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices2014-03-25Paper
Locally Updatable and Locally Decodable Codes2014-02-18Paper
Edge Fault Tolerance on Sparse Networks2012-11-01Paper
Functional Re-encryption and Collusion-Resistant Obfuscation2012-06-15Paper
Position-based quantum cryptography: impossibility and constructions2011-08-12Paper
Public-Key Encryption with Efficient Amortized Updates2010-09-10Paper
Improved fault tolerance and secure computation on sparse networks2010-09-07Paper
Position Based Cryptography2009-10-20Paper
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks2009-05-12Paper
New Constructions for UC Secure Computation Using Tamper-Proof Hardware2008-04-15Paper
Ring Signatures of Sub-linear Size Without Random Oracles2007-11-28Paper

Research outcomes over time

This page was built for person: Nishanth Chandran