Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Bhavana Kanukurthi
@inproceedings{DBLP:conf/ccs/GaneshKS22, author = {Chaya Ganesh and Bhavana Kanukurthi and Girisha Shankar}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Secure Auctions in the Presence of Rational Adversaries}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {1173--1186}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560706}, doi = {10.1145/3548606.3560706}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GaneshKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChandranKOS22, author = {Nishanth Chandran and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Short Leakage Resilient and Non-malleable Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {178--207}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_7}, doi = {10.1007/978-3-031-15802-5\_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChandranKOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/AggarwalKOOS22, author = {Divesh Aggarwal and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Maciej Obremski and Sruthi Sekar}, editor = {Stefano Leonardi and Anupam Gupta}, title = {Rate one-third non-malleable codes}, booktitle = {{STOC} '22: 54th Annual {ACM} {SIGACT} Symposium on Theory of Computing, Rome, Italy, June 20 - 24, 2022}, pages = {1364--1377}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3519935.3519972}, doi = {10.1145/3519935.3519972}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/AggarwalKOOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranKOS22, author = {Nishanth Chandran and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar}, title = {Short Leakage Resilient and Non-malleable Secret Sharing Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {216}, year = {2022}, url = {https://eprint.iacr.org/2022/216}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChandranKOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GaneshKS22, author = {Chaya Ganesh and Bhavana Kanukurthi and Girisha Shankar}, title = {Secure Auctions in the Presence of Rational Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1541}, year = {2022}, url = {https://eprint.iacr.org/2022/1541}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GaneshKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/KanukurthiOST21, author = {Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar and Jenit Tomy}, editor = {Stefano Tessaro}, title = {Locally Reconstructable Non-Malleable Secret Sharing}, booktitle = {2nd Conference on Information-Theoretic Cryptography, {ITC} 2021, July 23-26, 2021, Virtual Conference}, series = {LIPIcs}, volume = {199}, pages = {11:1--11:19}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.ITC.2021.11}, doi = {10.4230/LIPICS.ITC.2021.11}, timestamp = {Thu, 16 Sep 2021 15:58:53 +0200}, biburl = {https://dblp.org/rec/conf/citc/KanukurthiOST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChandranKOS21, author = {Nishanth Chandran and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar}, editor = {Tal Malkin and Chris Peikert}, title = {Adaptive Extractors and Their Application to Leakage Resilient Secret Sharing}, booktitle = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20, 2021, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12827}, pages = {595--624}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-84252-9\_20}, doi = {10.1007/978-3-030-84252-9\_20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChandranKOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/AggarwalKOOS21, author = {Divesh Aggarwal and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Maciej Obremski and Sruthi Sekar}, title = {Simplicity Meets Near-Optimal Rate: Non-malleable Codes and Non-malleable Two-source Extractors via Rate Boosters}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR21-117}}, year = {2021}, url = {https://eccc.weizmann.ac.il/report/2021/117}, eprinttype = {ECCC}, eprint = {TR21-117}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/AggarwalKOOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KanukurthiOST21, author = {Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar and Jenit Tomy}, title = {Locally Reconstructable Non-malleable Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {657}, year = {2021}, url = {https://eprint.iacr.org/2021/657}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KanukurthiOST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalKOOS21, author = {Divesh Aggarwal and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Maciej Obremski and Sruthi Sekar}, title = {Rate One-Third Non-malleable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1042}, year = {2021}, url = {https://eprint.iacr.org/2021/1042}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalKOOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KanukurthiOS20, author = {Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar}, title = {Four-State Non-malleable Codes with Explicit Constant Rate}, journal = {J. Cryptol.}, volume = {33}, number = {3}, pages = {1044--1079}, year = {2020}, url = {https://doi.org/10.1007/s00145-019-09339-7}, doi = {10.1007/S00145-019-09339-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KanukurthiOS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranKOS20, author = {Nishanth Chandran and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar}, title = {Constant Rate (Non-malleable) Secret Sharing Schemes Tolerating Joint Adaptive Leakage}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1252}, year = {2020}, url = {https://eprint.iacr.org/2020/1252}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChandranKOS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ChattopadhyayKO19, author = {Eshan Chattopadhyay and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar}, editor = {Feng Hao and Sushmita Ruj and Sourav Sen Gupta}, title = {Privacy Amplification from Non-malleable Codes}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2019 - 20th International Conference on Cryptology in India, Hyderabad, India, December 15-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11898}, pages = {318--337}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-35423-7\_16}, doi = {10.1007/978-3-030-35423-7\_16}, timestamp = {Wed, 20 Mar 2024 15:23:22 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/ChattopadhyayKO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KanukurthiOS18, author = {Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Non-malleable Randomness Encoders and Their Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {589--617}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_19}, doi = {10.1007/978-3-319-78372-7\_19}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KanukurthiOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChattopadhyayKO18, author = {Eshan Chattopadhyay and Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar}, title = {Privacy Amplification from Non-malleable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {293}, year = {2018}, url = {https://eprint.iacr.org/2018/293}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChattopadhyayKO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KanukurthiOS17, author = {Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar}, editor = {Yael Kalai and Leonid Reyzin}, title = {Four-State Non-malleable Codes with Explicit Constant Rate}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10678}, pages = {344--375}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70503-3\_11}, doi = {10.1007/978-3-319-70503-3\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KanukurthiOS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KanukurthiOS17, author = {Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar}, title = {Four-state Non-malleable Codes with Explicit Constant Rate}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {930}, year = {2017}, url = {http://eprint.iacr.org/2017/930}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KanukurthiOS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KanukurthiOS17a, author = {Bhavana Kanukurthi and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar}, title = {Non-malleable Randomness Encoders and their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1097}, year = {2017}, url = {http://eprint.iacr.org/2017/1097}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KanukurthiOS17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChandranKR16, author = {Nishanth Chandran and Bhavana Kanukurthi and Srinivasan Raghuraman}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Information-Theoretic Local Non-malleable Codes and Their Applications}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9563}, pages = {367--392}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49099-0\_14}, doi = {10.1007/978-3-662-49099-0\_14}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ChandranKR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranKR15, author = {Nishanth Chandran and Bhavana Kanukurthi and Srinivasan Raghuraman}, title = {Information-theoretic Local Non-malleable Codes and their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1056}, year = {2015}, url = {http://eprint.iacr.org/2015/1056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jacm/ChandranKOR14, author = {Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky and Leonid Reyzin}, title = {Privacy amplification with asymptotically optimal entropy loss}, journal = {J. {ACM}}, volume = {61}, number = {5}, pages = {29:1--29:28}, year = {2014}, url = {https://doi.org/10.1145/2630064}, doi = {10.1145/2630064}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jacm/ChandranKOR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AnanthCGKO14, author = {Prabhanjan Ananth and Nishanth Chandran and Vipul Goyal and Bhavana Kanukurthi and Rafail Ostrovsky}, editor = {Hugo Krawczyk}, title = {Achieving Privacy in Verifiable Computation with Multiple Servers - Without {FHE} and without Pre-processing}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {149--166}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_9}, doi = {10.1007/978-3-642-54631-0\_9}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AnanthCGKO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChandranKO14, author = {Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky}, editor = {Yehuda Lindell}, title = {Locally Updatable and Locally Decodable Codes}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {489--514}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_21}, doi = {10.1007/978-3-642-54242-8\_21}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ChandranKO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranKO13, author = {Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky}, title = {Locally Updatable and Locally Decodable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {520}, year = {2013}, url = {http://eprint.iacr.org/2013/520}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranKO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/DodisKKRS12, author = {Yevgeniy Dodis and Bhavana Kanukurthi and Jonathan Katz and Leonid Reyzin and Adam D. Smith}, title = {Robust Fuzzy Extractors and Authenticated Key Agreement From Close Secrets}, journal = {{IEEE} Trans. Inf. Theory}, volume = {58}, number = {9}, pages = {6207--6222}, year = {2012}, url = {https://doi.org/10.1109/TIT.2012.2200290}, doi = {10.1109/TIT.2012.2200290}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/DodisKKRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranKOR12, author = {Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky and Leonid Reyzin}, title = {Privacy Amplification with Asymptotically Optimal Entropy Loss}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {501}, year = {2012}, url = {http://eprint.iacr.org/2012/501}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranKOR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KalaiKS11, author = {Yael Tauman Kalai and Bhavana Kanukurthi and Amit Sahai}, editor = {Phillip Rogaway}, title = {Cryptography with Tamperable and Leaky Memory}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {373--390}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_21}, doi = {10.1007/978-3-642-22792-9\_21}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KalaiKS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/ChandranKOR10, author = {Nishanth Chandran and Bhavana Kanukurthi and Rafail Ostrovsky and Leonid Reyzin}, editor = {Leonard J. Schulman}, title = {Privacy amplification with asymptotically optimal entropy loss}, booktitle = {Proceedings of the 42nd {ACM} Symposium on Theory of Computing, {STOC} 2010, Cambridge, Massachusetts, USA, 5-8 June 2010}, pages = {785--794}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1806689.1806796}, doi = {10.1145/1806689.1806796}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/ChandranKOR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DodisKKRS10, author = {Yevgeniy Dodis and Bhavana Kanukurthi and Jonathan Katz and Leonid Reyzin and Adam D. Smith}, title = {Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {456}, year = {2010}, url = {http://eprint.iacr.org/2010/456}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DodisKKRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KanukurthiR09, author = {Bhavana Kanukurthi and Leonid Reyzin}, editor = {Antoine Joux}, title = {Key Agreement from Close Secrets over Unsecured Channels}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {206--223}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_12}, doi = {10.1007/978-3-642-01001-9\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KanukurthiR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KanukurthiR08, author = {Bhavana Kanukurthi and Leonid Reyzin}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {An Improved Robust Fuzzy Extractor}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {156--171}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_11}, doi = {10.1007/978-3-540-85855-3\_11}, timestamp = {Tue, 25 Feb 2020 11:33:46 +0100}, biburl = {https://dblp.org/rec/conf/scn/KanukurthiR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0807-0799, author = {Bhavana Kanukurthi and Leonid Reyzin}, title = {An Improved Robust Fuzzy Extractor}, journal = {CoRR}, volume = {abs/0807.0799}, year = {2008}, url = {http://arxiv.org/abs/0807.0799}, eprinttype = {arXiv}, eprint = {0807.0799}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0807-0799.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KanukurthiR08, author = {Bhavana Kanukurthi and Leonid Reyzin}, title = {An Improved Robust Fuzzy Extractor}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {278}, year = {2008}, url = {http://eprint.iacr.org/2008/278}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KanukurthiR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KanukurthiR08a, author = {Bhavana Kanukurthi and Leonid Reyzin}, title = {Key Agreement from Close Secrets over Unsecured Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {494}, year = {2008}, url = {http://eprint.iacr.org/2008/494}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KanukurthiR08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.