Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Muthuramakrishnan Venkitasubramaniam
@inproceedings{DBLP:conf/eurocrypt/AlonOV24, author = {Bar Alon and Eran Omri and Muthuramakrishnan Venkitasubramaniam}, editor = {Marc Joye and Gregor Leander}, title = {Can Alice and Bob Guarantee Output to Carol?}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14655}, pages = {32--61}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58740-5\_2}, doi = {10.1007/978-3-031-58740-5\_2}, timestamp = {Thu, 09 May 2024 11:05:30 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AlonOV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangHHKV24, author = {Yibin Yang and David Heath and Carmit Hazay and Vladimir Kolesnikov and Muthuramakrishnan Venkitasubramaniam}, title = {Tight {ZK} {CPU:} Batched {ZK} Branching with Cost Proportional to Evaluated Instruction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {456}, year = {2024}, url = {https://eprint.iacr.org/2024/456}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangHHKV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AmesHIV23, author = {Scott Ames and Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam}, title = {Ligero: lightweight sublinear arguments without a trusted setup}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3379--3424}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01222-8}, doi = {10.1007/S10623-023-01222-8}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/AmesHIV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HazayIV23, author = {Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam}, title = {Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model}, journal = {J. Cryptol.}, volume = {36}, number = {3}, pages = {26}, year = {2023}, url = {https://doi.org/10.1007/s00145-023-09465-3}, doi = {10.1007/S00145-023-09465-3}, timestamp = {Sat, 24 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HazayIV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/BangaloreSHV23, author = {Laasya Bangalore and Mohammad Hossein Faghihi Sereshgi and Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, editor = {Joseph K. Liu and Yang Xiang and Surya Nepal and Gene Tsudik}, title = {Flag: {A} Framework for Lightweight Robust Secure Aggregation}, booktitle = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {14--28}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3579856.3595805}, doi = {10.1145/3579856.3595805}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/BangaloreSHV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YangHHKV23, author = {Yibin Yang and David Heath and Carmit Hazay and Vladimir Kolesnikov and Muthuramakrishnan Venkitasubramaniam}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Batchman and Robin: Batched and Non-batched Branching for Interactive {ZK}}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {1452--1466}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623169}, doi = {10.1145/3576915.3623169}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YangHHKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AcharyaHPV23, author = {Anasuya Acharya and Carmit Hazay and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam}, editor = {Helena Handschuh and Anna Lysyanskaya}, title = {Best of Both Worlds - Revisiting the Spymasters Double Agent Problem}, booktitle = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August 20-24, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14081}, pages = {328--359}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-38557-5\_11}, doi = {10.1007/978-3-031-38557-5\_11}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AcharyaHPV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BhadauriaHVWZ23, author = {Rishabh Bhadauria and Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Wenxuan Wu and Yupeng Zhang}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Private Polynomial Commitments and Applications to {MPC}}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13941}, pages = {127--158}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31371-4\_5}, doi = {10.1007/978-3-031-31371-4\_5}, timestamp = {Fri, 05 May 2023 22:44:30 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BhadauriaHVWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HazayVW23, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge Proofs}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14369}, pages = {3--33}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48615-9\_1}, doi = {10.1007/978-3-031-48615-9\_1}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/HazayVW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HazayVW23a, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {Your Reputation's Safe with Me: Framing-Free Distributed Zero-Knowledge Proofs}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14369}, pages = {34--64}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48615-9\_2}, doi = {10.1007/978-3-031-48615-9\_2}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/HazayVW23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BhadauriaHVWZ23, author = {Rishabh Bhadauria and Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Wenxuan Wu and Yupeng Zhang}, title = {Private Polynomial Commitments and Applications to {MPC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {680}, year = {2023}, url = {https://eprint.iacr.org/2023/680}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BhadauriaHVWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AcharyaHPV23, author = {Anasuya Acharya and Carmit Hazay and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam}, title = {Best of Both Worlds: Revisiting the Spymasters Double Agent Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1013}, year = {2023}, url = {https://eprint.iacr.org/2023/1013}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AcharyaHPV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YangHHKV23, author = {Yibin Yang and David Heath and Carmit Hazay and Vladimir Kolesnikov and Muthuramakrishnan Venkitasubramaniam}, title = {Batchman and Robin: Batched and Non-batched Branching for Interactive {ZK}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1257}, year = {2023}, url = {https://eprint.iacr.org/2023/1257}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YangHHKV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlonOV23, author = {Bar Alon and Eran Omri and Muthuramakrishnan Venkitasubramaniam}, title = {Can Alice and Bob Guarantee Output to Carol?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1608}, year = {2023}, url = {https://eprint.iacr.org/2023/1608}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AlonOV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayVW23, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss}, title = {Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1819}, year = {2023}, url = {https://eprint.iacr.org/2023/1819}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HazayVW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HazayVW22, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss}, title = {ZK-PCPs from Leakage-Resilient Secret Sharing}, journal = {J. Cryptol.}, volume = {35}, number = {4}, pages = {23}, year = {2022}, url = {https://doi.org/10.1007/s00145-022-09433-3}, doi = {10.1007/S00145-022-09433-3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HazayVW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/CanettiPV22, author = {Ran Canetti and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam}, title = {Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model}, journal = {{SIAM} J. Comput.}, volume = {51}, number = {2}, pages = {17--333}, year = {2022}, url = {https://doi.org/10.1137/17m1151602}, doi = {10.1137/17M1151602}, timestamp = {Mon, 27 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/CanettiPV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/HazayVW22, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss}, editor = {Dana Dachman{-}Soled}, title = {Protecting Distributed Primitives Against Leakage: Equivocal Secret Sharing and More}, booktitle = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022, July 5-7, 2022, Cambridge, MA, {USA}}, series = {LIPIcs}, volume = {230}, pages = {3:1--3:24}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITC.2022.3}, doi = {10.4230/LIPICS.ITC.2022.3}, timestamp = {Thu, 30 Jun 2022 16:13:48 +0200}, biburl = {https://dblp.org/rec/conf/citc/HazayVW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BangaloreOPV22, author = {Laasya Bangalore and Rafail Ostrovsky and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Adaptively Secure Computation for {RAM} Programs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13276}, pages = {187--216}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07085-3\_7}, doi = {10.1007/978-3-031-07085-3\_7}, timestamp = {Tue, 31 May 2022 17:23:10 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BangaloreOPV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/CastroHIVV22, author = {Leo de Castro and Carmit Hazay and Yuval Ishai and Vinod Vaikuntanathan and Muthuramakrishnan Venkitasubramaniam}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Asymptotically Quasi-Optimal Cryptography}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13275}, pages = {303--334}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06944-4\_11}, doi = {10.1007/978-3-031-06944-4\_11}, timestamp = {Fri, 03 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/CastroHIVV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BangaloreBHV22, author = {Laasya Bangalore and Rishabh Bhadauria and Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13747}, pages = {417--446}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22318-1\_15}, doi = {10.1007/978-3-031-22318-1\_15}, timestamp = {Fri, 23 Dec 2022 17:47:37 +0100}, biburl = {https://dblp.org/rec/conf/tcc/BangaloreBHV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayVW22, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss}, title = {Protecting Distributed Primitives against Leakage: Equivocal Secret Sharing and More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {497}, year = {2022}, url = {https://eprint.iacr.org/2022/497}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayVW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayVW22a, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss}, title = {Your Reputation's Safe with Me: Framing-Free Distributed Zero-Knowledge Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1523}, year = {2022}, url = {https://eprint.iacr.org/2022/1523}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HazayVW22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmesHIV22, author = {Scott Ames and Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam}, title = {Ligero: Lightweight Sublinear Arguments Without a Trusted Setup}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1608}, year = {2022}, url = {https://eprint.iacr.org/2022/1608}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AmesHIV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BangaloreBHV22, author = {Laasya Bangalore and Rishabh Bhadauria and Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1612}, year = {2022}, url = {https://eprint.iacr.org/2022/1612}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BangaloreBHV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HaleviHPV21, author = {Shai Halevi and Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam}, title = {Round-Optimal Secure Multi-party Computation}, journal = {J. Cryptol.}, volume = {34}, number = {3}, pages = {19}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09382-3}, doi = {10.1007/S00145-021-09382-3}, timestamp = {Mon, 14 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HaleviHPV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigact/PassV21, author = {Rafael Pass and Muthuramakrishnan Venkitasubramaniam}, title = {Guest Column: Average-case Complexity Through the Lens of Interactive Puzzles}, journal = {{SIGACT} News}, volume = {52}, number = {1}, pages = {47--69}, year = {2021}, url = {https://doi.org/10.1145/3457588.3457598}, doi = {10.1145/3457588.3457598}, timestamp = {Mon, 26 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigact/PassV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/HazayVW21, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss}, editor = {Stefano Tessaro}, title = {ZK-PCPs from Leakage-Resilient Secret Sharing}, booktitle = {2nd Conference on Information-Theoretic Cryptography, {ITC} 2021, July 23-26, 2021, Virtual Conference}, series = {LIPIcs}, volume = {199}, pages = {6:1--6:21}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2021}, url = {https://doi.org/10.4230/LIPIcs.ITC.2021.6}, doi = {10.4230/LIPICS.ITC.2021.6}, timestamp = {Thu, 16 Sep 2021 15:58:53 +0200}, biburl = {https://dblp.org/rec/conf/citc/HazayVW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ChenHIKMRSVW21, author = {Megan Chen and Carmit Hazay and Yuval Ishai and Yuriy Kashnikov and Daniele Micciancio and Tarik Riviere and Abhi Shelat and Muthuramakrishnan Venkitasubramaniam and Ruihan Wang}, title = {Diogenes: Lightweight Scalable {RSA} Modulus Generation with a Dishonest Majority}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {590--607}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00025}, doi = {10.1109/SP40001.2021.00025}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/ChenHIKMRSVW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayVW21, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss}, title = {ZK-PCPs from Leakage-Resilient Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {606}, year = {2021}, url = {https://eprint.iacr.org/2021/606}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayVW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HazayV20, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {On the Power of Secure Two-Party Computation}, journal = {J. Cryptol.}, volume = {33}, number = {1}, pages = {271--318}, year = {2020}, url = {https://doi.org/10.1007/s00145-019-09314-2}, doi = {10.1007/S00145-019-09314-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HazayV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AbascalSHIV20, author = {Jackson Abascal and Mohammad Hossein Faghihi Sereshgi and Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Is the Classical {GMW} Paradigm Practical? The Case of Non-Interactive Actively Secure 2PC}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1591--1605}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3423366}, doi = {10.1145/3372297.3423366}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AbascalSHIV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BhadauriaFHVXZ20, author = {Rishabh Bhadauria and Zhiyong Fang and Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Tiancheng Xie and Yupeng Zhang}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Ligero++: {A} New Optimized Sublinear {IOP}}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {2025--2038}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417893}, doi = {10.1145/3372297.3417893}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BhadauriaFHVXZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HazayVW20, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss}, editor = {Anne Canteaut and Yuval Ishai}, title = {The Price of Active Security in Cryptographic Protocols}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {184--215}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_7}, doi = {10.1007/978-3-030-45724-2\_7}, timestamp = {Mon, 04 May 2020 14:32:28 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HazayVW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HazayPV20, author = {Carmit Hazay and Rafael Pass and Muthuramakrishnan Venkitasubramaniam}, editor = {Anne Canteaut and Yuval Ishai}, title = {Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions?}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {599--619}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_20}, doi = {10.1007/978-3-030-45727-3\_20}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HazayPV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/focs/PassV20, author = {Rafael Pass and Muthuramakrishnan Venkitasubramaniam}, editor = {Sandy Irani}, title = {Is it Easier to Prove Theorems that are Guaranteed to be True?}, booktitle = {61st {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS} 2020, Durham, NC, USA, November 16-19, 2020}, pages = {1255--1267}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/FOCS46700.2020.00119}, doi = {10.1109/FOCS46700.2020.00119}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/focs/PassV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HazaySV20, author = {Carmit Hazay and Abhi Shelat and Muthuramakrishnan Venkitasubramaniam}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Going Beyond Dual Execution: {MPC} for Functions with Efficient Verification}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12111}, pages = {328--356}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45388-6\_12}, doi = {10.1007/978-3-030-45388-6\_12}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HazaySV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/PassV20, author = {Rafael Pass and Muthuramakrishnan Venkitasubramaniam}, title = {Is it Easier to Prove Theorems that are Guaranteed to be True?}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR20-051}}, year = {2020}, url = {https://eccc.weizmann.ac.il/report/2020/051}, eprinttype = {ECCC}, eprint = {TR20-051}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/PassV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazaySV20, author = {Carmit Hazay and Abhi Shelat and Muthuramakrishnan Venkitasubramaniam}, title = {Going Beyond Dual Execution: {MPC} for Functions with Efficient Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {139}, year = {2020}, url = {https://eprint.iacr.org/2020/139}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazaySV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChenHIKMRSVW20, author = {Megan Chen and Carmit Hazay and Yuval Ishai and Yuriy Kashnikov and Daniele Micciancio and Tarik Riviere and Abhi Shelat and Muthuramakrishnan Venkitasubramaniam and Ruihan Wang}, title = {Diogenes: Lightweight Scalable {RSA} Modulus Generation with a Dishonest Majority}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {374}, year = {2020}, url = {https://eprint.iacr.org/2020/374}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChenHIKMRSVW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayIMV20, author = {Carmit Hazay and Yuval Ishai and Antonio Marcedone and Muthuramakrishnan Venkitasubramaniam}, title = {LevioSA: Lightweight Secure Arithmetic Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {393}, year = {2020}, url = {https://eprint.iacr.org/2020/393}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayIMV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HazayV19, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {On Black-Box Complexity of Universally Composable Security in the {CRS} Model}, journal = {J. Cryptol.}, volume = {32}, number = {3}, pages = {635--689}, year = {2019}, url = {https://doi.org/10.1007/s00145-019-09326-y}, doi = {10.1007/S00145-019-09326-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HazayV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/HazayV19a, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {What Security Can We Achieve Within 4 Rounds?}, journal = {J. Cryptol.}, volume = {32}, number = {4}, pages = {1200--1262}, year = {2019}, url = {https://doi.org/10.1007/s00145-019-09323-1}, doi = {10.1007/S00145-019-09323-1}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/HazayV19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HazayIMV19, author = {Carmit Hazay and Yuval Ishai and Antonio Marcedone and Muthuramakrishnan Venkitasubramaniam}, editor = {Lorenzo Cavallaro and Johannes Kinder and XiaoFeng Wang and Jonathan Katz}, title = {LevioSA: Lightweight Secure Arithmetic Computation}, booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2019, London, UK, November 11-15, 2019}, pages = {327--344}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3319535.3354258}, doi = {10.1145/3319535.3354258}, timestamp = {Tue, 10 Nov 2020 20:00:36 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HazayIMV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1906-10837, author = {Rafael Pass and Muthuramakrishnan Venkitasubramaniam}, title = {A Round-Collapse Theorem for Computationally-Sound Protocols; or, {TFNP} is Hard (on Average) in Pessiland}, journal = {CoRR}, volume = {abs/1906.10837}, year = {2019}, url = {http://arxiv.org/abs/1906.10837}, eprinttype = {arXiv}, eprint = {1906.10837}, timestamp = {Thu, 27 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1906-10837.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PassV19, author = {Rafael Pass and Muthuramakrishnan Venkitasubramaniam}, title = {A Round-Collapse Theorem for Computationally-Sound Protocols; or, {TFNP} is Hard (on Average) in Pessiland}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {754}, year = {2019}, url = {https://eprint.iacr.org/2019/754}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PassV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayVW19, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam and Mor Weiss}, title = {The Price of Active Security in Cryptographic Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1250}, year = {2019}, url = {https://eprint.iacr.org/2019/1250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayVW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HaleviHPV18, author = {Shai Halevi and Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Round-Optimal Secure Multi-Party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {488--520}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_17}, doi = {10.1007/978-3-319-96881-0\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HaleviHPV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BenhamoudaLPV18, author = {Fabrice Benhamouda and Huijia Lin and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Two-Round Adaptively Secure Multiparty Computation from Standard Assumptions}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {175--205}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_7}, doi = {10.1007/978-3-030-03807-6\_7}, timestamp = {Sat, 09 Apr 2022 12:44:08 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BenhamoudaLPV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HazayV18, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way Permutations}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {263--285}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_10}, doi = {10.1007/978-3-030-03807-6\_10}, timestamp = {Mon, 05 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/HazayV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-01372, author = {Siddharth Garg and Zahra Ghodsi and Carmit Hazay and Yuval Ishai and Antonio Marcedone and Muthuramakrishnan Venkitasubramaniam}, title = {Outsourcing Private Machine Learning via Lightweight Secure Arithmetic Computation}, journal = {CoRR}, volume = {abs/1812.01372}, year = {2018}, url = {http://arxiv.org/abs/1812.01372}, eprinttype = {arXiv}, eprint = {1812.01372}, timestamp = {Tue, 01 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-01372.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayV18, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {912}, year = {2018}, url = {https://eprint.iacr.org/2018/912}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AmesHIV17, author = {Scott Ames and Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {Ligero: Lightweight Sublinear Arguments Without a Trusted Setup}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {2087--2104}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134104}, doi = {10.1145/3133956.3134104}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AmesHIV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HazayV17, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, editor = {Serge Fehr}, title = {Scalable Multi-party Private Set-Intersection}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10174}, pages = {175--203}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54365-8\_8}, doi = {10.1007/978-3-662-54365-8\_8}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HazayV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/CanettiPV17, author = {Ran Canetti and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam}, editor = {Serge Fehr}, title = {Better Two-Round Adaptive Multi-party Computation}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {396--427}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_14}, doi = {10.1007/978-3-662-54388-7\_14}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/CanettiPV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HazayPV17, author = {Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam}, editor = {Serge Fehr}, title = {Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model}, booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10175}, pages = {428--460}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-662-54388-7\_15}, doi = {10.1007/978-3-662-54388-7\_15}, timestamp = {Thu, 23 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/HazayPV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/CanettiPV17, author = {Ran Canetti and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam}, editor = {Hamed Hatami and Pierre McKenzie and Valerie King}, title = {Equivocating Yao: constant-round adaptively secure multiparty computation in the plain model}, booktitle = {Proceedings of the 49th Annual {ACM} {SIGACT} Symposium on Theory of Computing, {STOC} 2017, Montreal, QC, Canada, June 19-23, 2017}, pages = {497--509}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3055399.3055495}, doi = {10.1145/3055399.3055495}, timestamp = {Sun, 02 Jun 2019 21:10:31 +0200}, biburl = {https://dblp.org/rec/conf/stoc/CanettiPV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HazayIV17, author = {Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam}, editor = {Yael Kalai and Leonid Reyzin}, title = {Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10678}, pages = {3--39}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70503-3\_1}, doi = {10.1007/978-3-319-70503-3\_1}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HazayIV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KiyoshimaLV17, author = {Susumu Kiyoshima and Huijia Lin and Muthuramakrishnan Venkitasubramaniam}, editor = {Yael Kalai and Leonid Reyzin}, title = {A Unified Approach to Constructing Black-Box {UC} Protocols in Trusted Setup Models}, booktitle = {Theory of Cryptography - 15th International Conference, {TCC} 2017, Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10677}, pages = {776--809}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70500-2\_26}, doi = {10.1007/978-3-319-70500-2\_26}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/KiyoshimaLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayPV17, author = {Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam}, title = {Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {26}, year = {2017}, url = {http://eprint.iacr.org/2017/026}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayPV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayV17, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {Scalable Multi-Party Private Set-Intersection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2017}, url = {http://eprint.iacr.org/2017/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KiyoshimaLV17, author = {Susumu Kiyoshima and Huijia Lin and Muthuramakrishnan Venkitasubramaniam}, title = {A Unified Approach to Constructing Black-box {UC} Protocols in Trusted Setup Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {944}, year = {2017}, url = {http://eprint.iacr.org/2017/944}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KiyoshimaLV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayIV17, author = {Carmit Hazay and Yuval Ishai and Muthuramakrishnan Venkitasubramaniam}, title = {Actively Secure Garbled Circuits with Constant Communication Overhead in the Plain Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {947}, year = {2017}, url = {http://eprint.iacr.org/2017/947}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayIV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaleviHPV17, author = {Shai Halevi and Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam}, title = {Round-Optimal Secure Multi-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1056}, year = {2017}, url = {http://eprint.iacr.org/2017/1056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaleviHPV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HazayV16, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, editor = {Matthew Robshaw and Jonathan Katz}, title = {On the Power of Secure Two-Party Computation}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {397--429}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_14}, doi = {10.1007/978-3-662-53008-5\_14}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HazayV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/MillerSSV16, author = {Douglas Miller and Adam Scrivener and Jesse Stern and Muthuramakrishnan Venkitasubramaniam}, editor = {Orr Dunkelman and Somitra Kumar Sanadhya}, title = {On Negation Complexity of Injections, Surjections and Collision-Resistance in Cryptography}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10095}, pages = {345--363}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49890-4\_19}, doi = {10.1007/978-3-319-49890-4\_19}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/MillerSSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/HazayV16, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {What Security Can We Achieve Within 4 Rounds?}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {486--505}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_26}, doi = {10.1007/978-3-319-44618-9\_26}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/HazayV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HazayPV16, author = {Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam}, editor = {Martin Hirt and Adam D. Smith}, title = {Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {367--399}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_15}, doi = {10.1007/978-3-662-53641-4\_15}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HazayPV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HazayV16, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, editor = {Martin Hirt and Adam D. Smith}, title = {Composable Adaptive Secure Protocols Without Setup Under Polytime Assumptions}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {400--432}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_16}, doi = {10.1007/978-3-662-53641-4\_16}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HazayV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayV16, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {On the Power of Secure Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2016}, url = {http://eprint.iacr.org/2016/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MillerSSV16, author = {Douglas Miller and Adam Scrivener and Jesse Stern and Muthuramakrishnan Venkitasubramaniam}, title = {On Negation Complexity of Injections, Surjections and Collision-Resistance in Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {192}, year = {2016}, url = {http://eprint.iacr.org/2016/192}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MillerSSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayV16a, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {Composable Adaptive Secure Protocols without Setup under Polytime Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {818}, year = {2016}, url = {http://eprint.iacr.org/2016/818}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayV16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiPV16, author = {Ran Canetti and Oxana Poburinnaya and Muthuramakrishnan Venkitasubramaniam}, title = {Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation in the Plain Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1190}, year = {2016}, url = {http://eprint.iacr.org/2016/1190}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiPV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HazayV15, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {On Black-Box Complexity of Universally Composable Security in the {CRS} Model}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9453}, pages = {183--209}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48800-3\_8}, doi = {10.1007/978-3-662-48800-3\_8}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HazayV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ShelatV15, author = {Abhi Shelat and Muthuramakrishnan Venkitasubramaniam}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Secure Computation from Millionaire}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {736--757}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_30}, doi = {10.1007/978-3-662-48797-6\_30}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ShelatV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/OstrovskySV15, author = {Rafail Ostrovsky and Alessandra Scafuro and Muthuramakrishnan Venkitasubramaniam}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Resettably Sound Zero-Knowledge Arguments from OWFs - The (Semi) Black-Box Way}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {345--374}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_15}, doi = {10.1007/978-3-662-46494-6\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/OstrovskySV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayV15, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {On Black-Box Complexity of Universally Composable Security in the {CRS} model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {488}, year = {2015}, url = {http://eprint.iacr.org/2015/488}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayV15a, author = {Carmit Hazay and Muthuramakrishnan Venkitasubramaniam}, title = {What Security can we Achieve in 4-Rounds?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {797}, year = {2015}, url = {http://eprint.iacr.org/2015/797}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayV15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HazayPV15, author = {Carmit Hazay and Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam}, title = {Round-Optimal Token-Based Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {887}, year = {2015}, url = {http://eprint.iacr.org/2015/887}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HazayPV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/PassTV14, author = {Rafael Pass and Wei{-}Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam}, title = {Concurrent Zero Knowledge, Revisited}, journal = {J. Cryptol.}, volume = {27}, number = {1}, pages = {45--66}, year = {2014}, url = {https://doi.org/10.1007/s00145-012-9137-2}, doi = {10.1007/S00145-012-9137-2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/PassTV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/PageKAVS14, author = {Alex Page and {\"{O}}v{\"{u}}n{\c{c}} Kocabas and Scott Ames and Muthuramakrishnan Venkitasubramaniam and Tolga Soyata}, title = {Cloud-based secure health monitoring: Optimizing fully-homomorphic encryption for streaming algorithms}, booktitle = {2014 {IEEE} {GLOBECOM} Workshops, Austin, TX, USA, December 8-12, 2014}, pages = {48--52}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/GLOCOMW.2014.7063384}, doi = {10.1109/GLOCOMW.2014.7063384}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/PageKAVS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Venkitasubramaniam14, author = {Muthuramakrishnan Venkitasubramaniam}, editor = {Michel Abdalla and Roberto De Prisco}, title = {On Adaptively Secure Protocols}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {455--475}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_26}, doi = {10.1007/978-3-319-10879-7\_26}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/Venkitasubramaniam14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/ChungOPVV14, author = {Kai{-}Min Chung and Rafail Ostrovsky and Rafael Pass and Muthuramakrishnan Venkitasubramaniam and Ivan Visconti}, editor = {Yehuda Lindell}, title = {4-Round Resettably-Sound Zero Knowledge}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {192--216}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_9}, doi = {10.1007/978-3-642-54242-8\_9}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/ChungOPVV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OstrovskySV14, author = {Rafail Ostrovsky and Alessandra Scafuro and Muthuramakrishnan Venkitasubramaniam}, title = {Resettably Sound Zero-Knoweldge Arguments from OWFs - the (semi) Black-Box way}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {284}, year = {2014}, url = {http://eprint.iacr.org/2014/284}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OstrovskySV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Dachman-SoledM0V13, author = {Dana Dachman{-}Soled and Tal Malkin and Mariana Raykova and Muthuramakrishnan Venkitasubramaniam}, editor = {Kazue Sako and Palash Sarkar}, title = {Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable Commitments}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8269}, pages = {316--336}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42033-7\_17}, doi = {10.1007/978-3-642-42033-7\_17}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Dachman-SoledM0V13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toct/PassV12, author = {Rafael Pass and Muthuramakrishnan Venkitasubramaniam}, title = {A Parallel Repetition Theorem for Constant-Round Arthur-Merlin Proofs}, journal = {{ACM} Trans. Comput. Theory}, volume = {4}, number = {4}, pages = {10:1--10:22}, year = {2012}, url = {https://doi.org/10.1145/2382559.2382561}, doi = {10.1145/2382559.2382561}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toct/PassV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AmesGV12, author = {Scott Ames and Rosario Gennaro and Muthuramakrishnan Venkitasubramaniam}, editor = {Xiaoyun Wang and Kazue Sako}, title = {The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {154--171}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_11}, doi = {10.1007/978-3-642-34961-4\_11}, timestamp = {Mon, 25 Nov 2019 15:32:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AmesGV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PassLV12, author = {Rafael Pass and Huijia Lin and Muthuramakrishnan Venkitasubramaniam}, editor = {Xiaoyun Wang and Kazue Sako}, title = {A Unified Framework for {UC} from Only {OT}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {699--717}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_42}, doi = {10.1007/978-3-642-34961-4\_42}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PassLV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Venkitasubramaniam11, author = {Muthuramakrishnan Venkitasubramaniam}, title = {Unified Framework for Concurrent Security}, school = {Cornell University, {USA}}, year = {2011}, timestamp = {Thu, 07 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Venkitasubramaniam11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/PassTV11, author = {Rafael Pass and Wei{-}Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam}, editor = {Yuval Ishai}, title = {Towards Non-Black-Box Lower Bounds in Cryptography}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {579--596}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_35}, doi = {10.1007/978-3-642-19571-6\_35}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/PassTV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledMRV11, author = {Dana Dachman{-}Soled and Tal Malkin and Mariana Raykova and Muthuramakrishnan Venkitasubramaniam}, title = {Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {611}, year = {2011}, url = {http://eprint.iacr.org/2011/611}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledMRV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/LinPTV10, author = {Huijia Lin and Rafael Pass and Wei{-}Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam}, editor = {Tal Rabin}, title = {Concurrent Non-Malleable Zero Knowledge Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {429--446}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_23}, doi = {10.1007/978-3-642-14623-7\_23}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/LinPTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/PassTV10, author = {Rafael Pass and Wei{-}Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam}, editor = {Daniele Micciancio}, title = {Eye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing Model}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {518--534}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_31}, doi = {10.1007/978-3-642-11799-2\_31}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/PassTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/PassV10, author = {Rafael Pass and Muthuramakrishnan Venkitasubramaniam}, editor = {Daniele Micciancio}, title = {Private Coins versus Public Coins in Zero-Knowledge Proof Systems}, booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC} 2010, Zurich, Switzerland, February 9-11, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5978}, pages = {588--605}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11799-2\_35}, doi = {10.1007/978-3-642-11799-2\_35}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/PassV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/LinPV09, author = {Huijia Lin and Rafael Pass and Muthuramakrishnan Venkitasubramaniam}, editor = {Michael Mitzenmacher}, title = {A unified framework for concurrent security: universal composability from stand-alone non-malleability}, booktitle = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing, {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009}, pages = {179--188}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1536414.1536441}, doi = {10.1145/1536414.1536441}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/LinPV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/PandeyPSTV08, author = {Omkant Pandey and Rafael Pass and Amit Sahai and Wei{-}Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam}, editor = {Nigel P. Smart}, title = {Precise Concurrent Zero Knowledge}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {397--414}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_23}, doi = {10.1007/978-3-540-78967-3\_23}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/PandeyPSTV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/PassV08, author = {Rafael Pass and Muthuramakrishnan Venkitasubramaniam}, editor = {Ran Canetti}, title = {On Constant-Round Concurrent Zero-Knowledge}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {553--570}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_30}, doi = {10.1007/978-3-540-78524-8\_30}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/PassV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/LinPV08, author = {Huijia Lin and Rafael Pass and Muthuramakrishnan Venkitasubramaniam}, editor = {Ran Canetti}, title = {Concurrent Non-malleable Commitments from Any One-Way Function}, booktitle = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC} 2008, New York, USA, March 19-21, 2008}, series = {Lecture Notes in Computer Science}, volume = {4948}, pages = {571--588}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78524-8\_31}, doi = {10.1007/978-3-540-78524-8\_31}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/LinPV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkdd/MachanavajjhalaKGV07, author = {Ashwin Machanavajjhala and Daniel Kifer and Johannes Gehrke and Muthuramakrishnan Venkitasubramaniam}, title = {\emph{L}-diversity: Privacy beyond \emph{k}-anonymity}, journal = {{ACM} Trans. Knowl. Discov. Data}, volume = {1}, number = {1}, pages = {3}, year = {2007}, url = {https://doi.org/10.1145/1217299.1217302}, doi = {10.1145/1217299.1217302}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkdd/MachanavajjhalaKGV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/PassV07, author = {Rafael Pass and Muthuramakrishnan Venkitasubramaniam}, editor = {David S. Johnson and Uriel Feige}, title = {An efficient parallel repetition theorem for Arthur-Merlin games}, booktitle = {Proceedings of the 39th Annual {ACM} Symposium on Theory of Computing, San Diego, California, USA, June 11-13, 2007}, pages = {420--429}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1250790.1250853}, doi = {10.1145/1250790.1250853}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/PassV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PandeyPSTV07, author = {Omkant Pandey and Rafael Pass and Amit Sahai and Wei{-}Lung Dustin Tseng and Muthuramakrishnan Venkitasubramaniam}, title = {Precise Concurrent Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {451}, year = {2007}, url = {http://eprint.iacr.org/2007/451}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PandeyPSTV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/VenkitasubramaniamMMG06, author = {Muthuramakrishnan Venkitasubramaniam and Ashwin Machanavajjhala and David J. Martin and Johannes Gehrke}, editor = {Roger S. Barga and Xiaofang Zhou}, title = {Trusted {CVS}}, booktitle = {Proceedings of the 22nd International Conference on Data Engineering Workshops, {ICDE} 2006, 3-7 April 2006, Atlanta, GA, {USA}}, pages = {23}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICDEW.2006.155}, doi = {10.1109/ICDEW.2006.155}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/VenkitasubramaniamMMG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/MachanavajjhalaGKV06, author = {Ashwin Machanavajjhala and Johannes Gehrke and Daniel Kifer and Muthuramakrishnan Venkitasubramaniam}, editor = {Ling Liu and Andreas Reuter and Kyu{-}Young Whang and Jianjun Zhang}, title = {l-Diversity: Privacy Beyond k-Anonymity}, booktitle = {Proceedings of the 22nd International Conference on Data Engineering, {ICDE} 2006, 3-8 April 2006, Atlanta, GA, {USA}}, pages = {24}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ICDE.2006.1}, doi = {10.1109/ICDE.2006.1}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/MachanavajjhalaGKV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/podc/RavikantMSSR04, author = {D. V. S. Ravikant and Muthuramakrishnan Venkitasubramaniam and V. Srikanth and K. Srinathan and C. Pandu Rangan}, editor = {Soma Chaudhuri and Shay Kutten}, title = {Brief announcement: on the round complexity of distributed consensus over synchronous networks}, booktitle = {Proceedings of the Twenty-Third Annual {ACM} Symposium on Principles of Distributed Computing, {PODC} 2004, St. John's, Newfoundland, Canada, July 25-28, 2004}, pages = {397}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1011767.1011862}, doi = {10.1145/1011767.1011862}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/podc/RavikantMSSR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/RavikantMSSR04, author = {D. V. S. Ravikant and Muthuramakrishnan Venkitasubramaniam and V. Srikanth and K. Srinathan and C. Pandu Rangan}, editor = {Rachid Guerraoui}, title = {On Byzantine Agreement over (2, 3)-Uniform Hypergraphs}, booktitle = {Distributed Computing, 18th International Conference, {DISC} 2004, Amsterdam, The Netherlands, October 4-7, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3274}, pages = {450--464}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30186-8\_32}, doi = {10.1007/978-3-540-30186-8\_32}, timestamp = {Wed, 07 Dec 2022 23:11:11 +0100}, biburl = {https://dblp.org/rec/conf/wdag/RavikantMSSR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.