BibTeX records: Muthuramakrishnan Venkitasubramaniam

download as .bib file

@inproceedings{DBLP:conf/eurocrypt/AlonOV24,
  author       = {Bar Alon and
                  Eran Omri and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Marc Joye and
                  Gregor Leander},
  title        = {Can Alice and Bob Guarantee Output to Carol?},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14655},
  pages        = {32--61},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-58740-5\_2},
  doi          = {10.1007/978-3-031-58740-5\_2},
  timestamp    = {Thu, 09 May 2024 11:05:30 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AlonOV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangHHKV24,
  author       = {Yibin Yang and
                  David Heath and
                  Carmit Hazay and
                  Vladimir Kolesnikov and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Tight {ZK} {CPU:} Batched {ZK} Branching with Cost Proportional to
                  Evaluated Instruction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {456},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/456},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangHHKV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AmesHIV23,
  author       = {Scott Ames and
                  Carmit Hazay and
                  Yuval Ishai and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Ligero: lightweight sublinear arguments without a trusted setup},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3379--3424},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01222-8},
  doi          = {10.1007/S10623-023-01222-8},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/AmesHIV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HazayIV23,
  author       = {Carmit Hazay and
                  Yuval Ishai and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Actively Secure Garbled Circuits with Constant Communication Overhead
                  in the Plain Model},
  journal      = {J. Cryptol.},
  volume       = {36},
  number       = {3},
  pages        = {26},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00145-023-09465-3},
  doi          = {10.1007/S00145-023-09465-3},
  timestamp    = {Sat, 24 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HazayIV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/BangaloreSHV23,
  author       = {Laasya Bangalore and
                  Mohammad Hossein Faghihi Sereshgi and
                  Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Joseph K. Liu and
                  Yang Xiang and
                  Surya Nepal and
                  Gene Tsudik},
  title        = {Flag: {A} Framework for Lightweight Robust Secure Aggregation},
  booktitle    = {Proceedings of the 2023 {ACM} Asia Conference on Computer and Communications
                  Security, {ASIA} {CCS} 2023, Melbourne, VIC, Australia, July 10-14,
                  2023},
  pages        = {14--28},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579856.3595805},
  doi          = {10.1145/3579856.3595805},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/BangaloreSHV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangHHKV23,
  author       = {Yibin Yang and
                  David Heath and
                  Carmit Hazay and
                  Vladimir Kolesnikov and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Batchman and Robin: Batched and Non-batched Branching for Interactive
                  {ZK}},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {1452--1466},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623169},
  doi          = {10.1145/3576915.3623169},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YangHHKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AcharyaHPV23,
  author       = {Anasuya Acharya and
                  Carmit Hazay and
                  Oxana Poburinnaya and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Best of Both Worlds - Revisiting the Spymasters Double Agent Problem},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {328--359},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_11},
  doi          = {10.1007/978-3-031-38557-5\_11},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AcharyaHPV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BhadauriaHVWZ23,
  author       = {Rishabh Bhadauria and
                  Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam and
                  Wenxuan Wu and
                  Yupeng Zhang},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Private Polynomial Commitments and Applications to {MPC}},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13941},
  pages        = {127--158},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31371-4\_5},
  doi          = {10.1007/978-3-031-31371-4\_5},
  timestamp    = {Fri, 05 May 2023 22:44:30 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/BhadauriaHVWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HazayVW23,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam and
                  Mor Weiss},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge
                  Proofs},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14369},
  pages        = {3--33},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48615-9\_1},
  doi          = {10.1007/978-3-031-48615-9\_1},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/HazayVW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HazayVW23a,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam and
                  Mor Weiss},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Your Reputation's Safe with Me: Framing-Free Distributed Zero-Knowledge
                  Proofs},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14369},
  pages        = {34--64},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48615-9\_2},
  doi          = {10.1007/978-3-031-48615-9\_2},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/HazayVW23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BhadauriaHVWZ23,
  author       = {Rishabh Bhadauria and
                  Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam and
                  Wenxuan Wu and
                  Yupeng Zhang},
  title        = {Private Polynomial Commitments and Applications to {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {680},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/680},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BhadauriaHVWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AcharyaHPV23,
  author       = {Anasuya Acharya and
                  Carmit Hazay and
                  Oxana Poburinnaya and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Best of Both Worlds: Revisiting the Spymasters Double Agent Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1013},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1013},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AcharyaHPV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YangHHKV23,
  author       = {Yibin Yang and
                  David Heath and
                  Carmit Hazay and
                  Vladimir Kolesnikov and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Batchman and Robin: Batched and Non-batched Branching for Interactive
                  {ZK}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1257},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1257},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YangHHKV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlonOV23,
  author       = {Bar Alon and
                  Eran Omri and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Can Alice and Bob Guarantee Output to Carol?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1608},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1608},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AlonOV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayVW23,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam and
                  Mor Weiss},
  title        = {Beyond MPC-in-the-Head: Black-Box Constructions of Short Zero-Knowledge
                  Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1819},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1819},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayVW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HazayVW22,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam and
                  Mor Weiss},
  title        = {ZK-PCPs from Leakage-Resilient Secret Sharing},
  journal      = {J. Cryptol.},
  volume       = {35},
  number       = {4},
  pages        = {23},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00145-022-09433-3},
  doi          = {10.1007/S00145-022-09433-3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HazayVW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/CanettiPV22,
  author       = {Ran Canetti and
                  Oxana Poburinnaya and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation
                  in the Plain Model},
  journal      = {{SIAM} J. Comput.},
  volume       = {51},
  number       = {2},
  pages        = {17--333},
  year         = {2022},
  url          = {https://doi.org/10.1137/17m1151602},
  doi          = {10.1137/17M1151602},
  timestamp    = {Mon, 27 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/CanettiPV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/HazayVW22,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam and
                  Mor Weiss},
  editor       = {Dana Dachman{-}Soled},
  title        = {Protecting Distributed Primitives Against Leakage: Equivocal Secret
                  Sharing and More},
  booktitle    = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022,
                  July 5-7, 2022, Cambridge, MA, {USA}},
  series       = {LIPIcs},
  volume       = {230},
  pages        = {3:1--3:24},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2022.3},
  doi          = {10.4230/LIPICS.ITC.2022.3},
  timestamp    = {Thu, 30 Jun 2022 16:13:48 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/HazayVW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BangaloreOPV22,
  author       = {Laasya Bangalore and
                  Rafail Ostrovsky and
                  Oxana Poburinnaya and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Adaptively Secure Computation for {RAM} Programs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13276},
  pages        = {187--216},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07085-3\_7},
  doi          = {10.1007/978-3-031-07085-3\_7},
  timestamp    = {Tue, 31 May 2022 17:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BangaloreOPV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CastroHIVV22,
  author       = {Leo de Castro and
                  Carmit Hazay and
                  Yuval Ishai and
                  Vinod Vaikuntanathan and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Asymptotically Quasi-Optimal Cryptography},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13275},
  pages        = {303--334},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06944-4\_11},
  doi          = {10.1007/978-3-031-06944-4\_11},
  timestamp    = {Fri, 03 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CastroHIVV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BangaloreBHV22,
  author       = {Laasya Bangalore and
                  Rishabh Bhadauria and
                  Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {On Black-Box Constructions of Time and Space Efficient Sublinear Arguments
                  from Symmetric-Key Primitives},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13747},
  pages        = {417--446},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22318-1\_15},
  doi          = {10.1007/978-3-031-22318-1\_15},
  timestamp    = {Fri, 23 Dec 2022 17:47:37 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BangaloreBHV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayVW22,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam and
                  Mor Weiss},
  title        = {Protecting Distributed Primitives against Leakage: Equivocal Secret
                  Sharing and More},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {497},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/497},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayVW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayVW22a,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam and
                  Mor Weiss},
  title        = {Your Reputation's Safe with Me: Framing-Free Distributed Zero-Knowledge
                  Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1523},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1523},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayVW22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AmesHIV22,
  author       = {Scott Ames and
                  Carmit Hazay and
                  Yuval Ishai and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Ligero: Lightweight Sublinear Arguments Without a Trusted Setup},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1608},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1608},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AmesHIV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BangaloreBHV22,
  author       = {Laasya Bangalore and
                  Rishabh Bhadauria and
                  Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {On Black-Box Constructions of Time and Space Efficient Sublinear Arguments
                  from Symmetric-Key Primitives},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1612},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1612},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BangaloreBHV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HaleviHPV21,
  author       = {Shai Halevi and
                  Carmit Hazay and
                  Antigoni Polychroniadou and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Round-Optimal Secure Multi-party Computation},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {3},
  pages        = {19},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09382-3},
  doi          = {10.1007/S00145-021-09382-3},
  timestamp    = {Mon, 14 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HaleviHPV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigact/PassV21,
  author       = {Rafael Pass and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Guest Column: Average-case Complexity Through the Lens of Interactive
                  Puzzles},
  journal      = {{SIGACT} News},
  volume       = {52},
  number       = {1},
  pages        = {47--69},
  year         = {2021},
  url          = {https://doi.org/10.1145/3457588.3457598},
  doi          = {10.1145/3457588.3457598},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigact/PassV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/HazayVW21,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam and
                  Mor Weiss},
  editor       = {Stefano Tessaro},
  title        = {ZK-PCPs from Leakage-Resilient Secret Sharing},
  booktitle    = {2nd Conference on Information-Theoretic Cryptography, {ITC} 2021,
                  July 23-26, 2021, Virtual Conference},
  series       = {LIPIcs},
  volume       = {199},
  pages        = {6:1--6:21},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2021},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2021.6},
  doi          = {10.4230/LIPICS.ITC.2021.6},
  timestamp    = {Thu, 16 Sep 2021 15:58:53 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/HazayVW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChenHIKMRSVW21,
  author       = {Megan Chen and
                  Carmit Hazay and
                  Yuval Ishai and
                  Yuriy Kashnikov and
                  Daniele Micciancio and
                  Tarik Riviere and
                  Abhi Shelat and
                  Muthuramakrishnan Venkitasubramaniam and
                  Ruihan Wang},
  title        = {Diogenes: Lightweight Scalable {RSA} Modulus Generation with a Dishonest
                  Majority},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {590--607},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00025},
  doi          = {10.1109/SP40001.2021.00025},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/ChenHIKMRSVW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayVW21,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam and
                  Mor Weiss},
  title        = {ZK-PCPs from Leakage-Resilient Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {606},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/606},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayVW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HazayV20,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {On the Power of Secure Two-Party Computation},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {1},
  pages        = {271--318},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-019-09314-2},
  doi          = {10.1007/S00145-019-09314-2},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HazayV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AbascalSHIV20,
  author       = {Jackson Abascal and
                  Mohammad Hossein Faghihi Sereshgi and
                  Carmit Hazay and
                  Yuval Ishai and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Is the Classical {GMW} Paradigm Practical? The Case of Non-Interactive
                  Actively Secure 2PC},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1591--1605},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3423366},
  doi          = {10.1145/3372297.3423366},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AbascalSHIV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BhadauriaFHVXZ20,
  author       = {Rishabh Bhadauria and
                  Zhiyong Fang and
                  Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam and
                  Tiancheng Xie and
                  Yupeng Zhang},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Ligero++: {A} New Optimized Sublinear {IOP}},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {2025--2038},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417893},
  doi          = {10.1145/3372297.3417893},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BhadauriaFHVXZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HazayVW20,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam and
                  Mor Weiss},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {The Price of Active Security in Cryptographic Protocols},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12106},
  pages        = {184--215},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45724-2\_7},
  doi          = {10.1007/978-3-030-45724-2\_7},
  timestamp    = {Mon, 04 May 2020 14:32:28 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HazayVW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HazayPV20,
  author       = {Carmit Hazay and
                  Rafael Pass and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments
                  from One-Way Functions?},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12107},
  pages        = {599--619},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45727-3\_20},
  doi          = {10.1007/978-3-030-45727-3\_20},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HazayPV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/PassV20,
  author       = {Rafael Pass and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Sandy Irani},
  title        = {Is it Easier to Prove Theorems that are Guaranteed to be True?},
  booktitle    = {61st {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2020, Durham, NC, USA, November 16-19, 2020},
  pages        = {1255--1267},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/FOCS46700.2020.00119},
  doi          = {10.1109/FOCS46700.2020.00119},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/focs/PassV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HazaySV20,
  author       = {Carmit Hazay and
                  Abhi Shelat and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Going Beyond Dual Execution: {MPC} for Functions with Efficient Verification},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12111},
  pages        = {328--356},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45388-6\_12},
  doi          = {10.1007/978-3-030-45388-6\_12},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HazaySV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/PassV20,
  author       = {Rafael Pass and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Is it Easier to Prove Theorems that are Guaranteed to be True?},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR20-051}},
  year         = {2020},
  url          = {https://eccc.weizmann.ac.il/report/2020/051},
  eprinttype    = {ECCC},
  eprint       = {TR20-051},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/PassV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazaySV20,
  author       = {Carmit Hazay and
                  Abhi Shelat and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Going Beyond Dual Execution: {MPC} for Functions with Efficient Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {139},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/139},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazaySV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChenHIKMRSVW20,
  author       = {Megan Chen and
                  Carmit Hazay and
                  Yuval Ishai and
                  Yuriy Kashnikov and
                  Daniele Micciancio and
                  Tarik Riviere and
                  Abhi Shelat and
                  Muthuramakrishnan Venkitasubramaniam and
                  Ruihan Wang},
  title        = {Diogenes: Lightweight Scalable {RSA} Modulus Generation with a Dishonest
                  Majority},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {374},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/374},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChenHIKMRSVW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayIMV20,
  author       = {Carmit Hazay and
                  Yuval Ishai and
                  Antonio Marcedone and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {LevioSA: Lightweight Secure Arithmetic Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {393},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/393},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayIMV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HazayV19,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {On Black-Box Complexity of Universally Composable Security in the
                  {CRS} Model},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {3},
  pages        = {635--689},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-019-09326-y},
  doi          = {10.1007/S00145-019-09326-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HazayV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/HazayV19a,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {What Security Can We Achieve Within 4 Rounds?},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {4},
  pages        = {1200--1262},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-019-09323-1},
  doi          = {10.1007/S00145-019-09323-1},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/HazayV19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HazayIMV19,
  author       = {Carmit Hazay and
                  Yuval Ishai and
                  Antonio Marcedone and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {LevioSA: Lightweight Secure Arithmetic Computation},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {327--344},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354258},
  doi          = {10.1145/3319535.3354258},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HazayIMV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1906-10837,
  author       = {Rafael Pass and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {A Round-Collapse Theorem for Computationally-Sound Protocols; or,
                  {TFNP} is Hard (on Average) in Pessiland},
  journal      = {CoRR},
  volume       = {abs/1906.10837},
  year         = {2019},
  url          = {http://arxiv.org/abs/1906.10837},
  eprinttype    = {arXiv},
  eprint       = {1906.10837},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1906-10837.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PassV19,
  author       = {Rafael Pass and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {A Round-Collapse Theorem for Computationally-Sound Protocols; or,
                  {TFNP} is Hard (on Average) in Pessiland},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {754},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/754},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PassV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayVW19,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam and
                  Mor Weiss},
  title        = {The Price of Active Security in Cryptographic Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1250},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayVW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HaleviHPV18,
  author       = {Shai Halevi and
                  Carmit Hazay and
                  Antigoni Polychroniadou and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Round-Optimal Secure Multi-Party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {488--520},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_17},
  doi          = {10.1007/978-3-319-96881-0\_17},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HaleviHPV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BenhamoudaLPV18,
  author       = {Fabrice Benhamouda and
                  Huijia Lin and
                  Antigoni Polychroniadou and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Two-Round Adaptively Secure Multiparty Computation from Standard Assumptions},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {175--205},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_7},
  doi          = {10.1007/978-3-030-03807-6\_7},
  timestamp    = {Sat, 09 Apr 2022 12:44:08 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BenhamoudaLPV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HazayV18,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way
                  Permutations},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {263--285},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_10},
  doi          = {10.1007/978-3-030-03807-6\_10},
  timestamp    = {Mon, 05 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/HazayV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-01372,
  author       = {Siddharth Garg and
                  Zahra Ghodsi and
                  Carmit Hazay and
                  Yuval Ishai and
                  Antonio Marcedone and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Outsourcing Private Machine Learning via Lightweight Secure Arithmetic
                  Computation},
  journal      = {CoRR},
  volume       = {abs/1812.01372},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.01372},
  eprinttype    = {arXiv},
  eprint       = {1812.01372},
  timestamp    = {Tue, 01 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-01372.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayV18,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Round-Optimal Fully Black-Box Zero-Knowledge Arguments from One-Way
                  Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {912},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/912},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AmesHIV17,
  author       = {Scott Ames and
                  Carmit Hazay and
                  Yuval Ishai and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {Ligero: Lightweight Sublinear Arguments Without a Trusted Setup},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {2087--2104},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134104},
  doi          = {10.1145/3133956.3134104},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AmesHIV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HazayV17,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Serge Fehr},
  title        = {Scalable Multi-party Private Set-Intersection},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10174},
  pages        = {175--203},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54365-8\_8},
  doi          = {10.1007/978-3-662-54365-8\_8},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HazayV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CanettiPV17,
  author       = {Ran Canetti and
                  Oxana Poburinnaya and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Serge Fehr},
  title        = {Better Two-Round Adaptive Multi-party Computation},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {396--427},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_14},
  doi          = {10.1007/978-3-662-54388-7\_14},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/CanettiPV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HazayPV17,
  author       = {Carmit Hazay and
                  Antigoni Polychroniadou and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Serge Fehr},
  title        = {Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware
                  Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Amsterdam, The
                  Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10175},
  pages        = {428--460},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-662-54388-7\_15},
  doi          = {10.1007/978-3-662-54388-7\_15},
  timestamp    = {Thu, 23 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/HazayPV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/CanettiPV17,
  author       = {Ran Canetti and
                  Oxana Poburinnaya and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Hamed Hatami and
                  Pierre McKenzie and
                  Valerie King},
  title        = {Equivocating Yao: constant-round adaptively secure multiparty computation
                  in the plain model},
  booktitle    = {Proceedings of the 49th Annual {ACM} {SIGACT} Symposium on Theory
                  of Computing, {STOC} 2017, Montreal, QC, Canada, June 19-23, 2017},
  pages        = {497--509},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3055399.3055495},
  doi          = {10.1145/3055399.3055495},
  timestamp    = {Sun, 02 Jun 2019 21:10:31 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/CanettiPV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HazayIV17,
  author       = {Carmit Hazay and
                  Yuval Ishai and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Actively Secure Garbled Circuits with Constant Communication Overhead
                  in the Plain Model},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10678},
  pages        = {3--39},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70503-3\_1},
  doi          = {10.1007/978-3-319-70503-3\_1},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HazayIV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KiyoshimaLV17,
  author       = {Susumu Kiyoshima and
                  Huijia Lin and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {A Unified Approach to Constructing Black-Box {UC} Protocols in Trusted
                  Setup Models},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {776--809},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_26},
  doi          = {10.1007/978-3-319-70500-2\_26},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KiyoshimaLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayPV17,
  author       = {Carmit Hazay and
                  Antigoni Polychroniadou and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {26},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/026},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayPV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayV17,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Scalable Multi-Party Private Set-Intersection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KiyoshimaLV17,
  author       = {Susumu Kiyoshima and
                  Huijia Lin and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {A Unified Approach to Constructing Black-box {UC} Protocols in Trusted
                  Setup Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {944},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/944},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KiyoshimaLV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayIV17,
  author       = {Carmit Hazay and
                  Yuval Ishai and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Actively Secure Garbled Circuits with Constant Communication Overhead
                  in the Plain Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {947},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/947},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayIV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaleviHPV17,
  author       = {Shai Halevi and
                  Carmit Hazay and
                  Antigoni Polychroniadou and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Round-Optimal Secure Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1056},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaleviHPV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HazayV16,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {On the Power of Secure Two-Party Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {397--429},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_14},
  doi          = {10.1007/978-3-662-53008-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HazayV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MillerSSV16,
  author       = {Douglas Miller and
                  Adam Scrivener and
                  Jesse Stern and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Orr Dunkelman and
                  Somitra Kumar Sanadhya},
  title        = {On Negation Complexity of Injections, Surjections and Collision-Resistance
                  in Cryptography},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2016 - 17th International Conference
                  on Cryptology in India, Kolkata, India, December 11-14, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10095},
  pages        = {345--363},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49890-4\_19},
  doi          = {10.1007/978-3-319-49890-4\_19},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/MillerSSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/HazayV16,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {What Security Can We Achieve Within 4 Rounds?},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {486--505},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_26},
  doi          = {10.1007/978-3-319-44618-9\_26},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/HazayV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HazayPV16,
  author       = {Carmit Hazay and
                  Antigoni Polychroniadou and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Composable Security in the Tamper-Proof Hardware Model Under Minimal
                  Complexity},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {367--399},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_15},
  doi          = {10.1007/978-3-662-53641-4\_15},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HazayPV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/HazayV16,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Composable Adaptive Secure Protocols Without Setup Under Polytime
                  Assumptions},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {400--432},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_16},
  doi          = {10.1007/978-3-662-53641-4\_16},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/HazayV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayV16,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {On the Power of Secure Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MillerSSV16,
  author       = {Douglas Miller and
                  Adam Scrivener and
                  Jesse Stern and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {On Negation Complexity of Injections, Surjections and Collision-Resistance
                  in Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {192},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/192},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MillerSSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayV16a,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Composable Adaptive Secure Protocols without Setup under Polytime
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {818},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/818},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayV16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiPV16,
  author       = {Ran Canetti and
                  Oxana Poburinnaya and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Equivocating Yao: Constant-Round Adaptively Secure Multiparty Computation
                  in the Plain Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1190},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiPV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HazayV15,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {On Black-Box Complexity of Universally Composable Security in the
                  {CRS} Model},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9453},
  pages        = {183--209},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48800-3\_8},
  doi          = {10.1007/978-3-662-48800-3\_8},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HazayV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ShelatV15,
  author       = {Abhi Shelat and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Secure Computation from Millionaire},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {736--757},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_30},
  doi          = {10.1007/978-3-662-48797-6\_30},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ShelatV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/OstrovskySV15,
  author       = {Rafail Ostrovsky and
                  Alessandra Scafuro and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {Resettably Sound Zero-Knowledge Arguments from OWFs - The (Semi) Black-Box
                  Way},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {345--374},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_15},
  doi          = {10.1007/978-3-662-46494-6\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/OstrovskySV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayV15,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {On Black-Box Complexity of Universally Composable Security in the
                  {CRS} model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {488},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/488},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayV15a,
  author       = {Carmit Hazay and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {What Security can we Achieve in 4-Rounds?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {797},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/797},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayV15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HazayPV15,
  author       = {Carmit Hazay and
                  Antigoni Polychroniadou and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Round-Optimal Token-Based Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {887},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/887},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HazayPV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/PassTV14,
  author       = {Rafael Pass and
                  Wei{-}Lung Dustin Tseng and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Concurrent Zero Knowledge, Revisited},
  journal      = {J. Cryptol.},
  volume       = {27},
  number       = {1},
  pages        = {45--66},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00145-012-9137-2},
  doi          = {10.1007/S00145-012-9137-2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/PassTV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/PageKAVS14,
  author       = {Alex Page and
                  {\"{O}}v{\"{u}}n{\c{c}} Kocabas and
                  Scott Ames and
                  Muthuramakrishnan Venkitasubramaniam and
                  Tolga Soyata},
  title        = {Cloud-based secure health monitoring: Optimizing fully-homomorphic
                  encryption for streaming algorithms},
  booktitle    = {2014 {IEEE} {GLOBECOM} Workshops, Austin, TX, USA, December 8-12,
                  2014},
  pages        = {48--52},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/GLOCOMW.2014.7063384},
  doi          = {10.1109/GLOCOMW.2014.7063384},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/PageKAVS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Venkitasubramaniam14,
  author       = {Muthuramakrishnan Venkitasubramaniam},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {On Adaptively Secure Protocols},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {455--475},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_26},
  doi          = {10.1007/978-3-319-10879-7\_26},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Venkitasubramaniam14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/ChungOPVV14,
  author       = {Kai{-}Min Chung and
                  Rafail Ostrovsky and
                  Rafael Pass and
                  Muthuramakrishnan Venkitasubramaniam and
                  Ivan Visconti},
  editor       = {Yehuda Lindell},
  title        = {4-Round Resettably-Sound Zero Knowledge},
  booktitle    = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
                  2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8349},
  pages        = {192--216},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54242-8\_9},
  doi          = {10.1007/978-3-642-54242-8\_9},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/ChungOPVV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OstrovskySV14,
  author       = {Rafail Ostrovsky and
                  Alessandra Scafuro and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Resettably Sound Zero-Knoweldge Arguments from OWFs - the (semi) Black-Box
                  way},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {284},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/284},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OstrovskySV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Dachman-SoledM0V13,
  author       = {Dana Dachman{-}Soled and
                  Tal Malkin and
                  Mariana Raykova and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Adaptive and Concurrent Secure Computation from New Adaptive, Non-malleable
                  Commitments},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {316--336},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42033-7\_17},
  doi          = {10.1007/978-3-642-42033-7\_17},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Dachman-SoledM0V13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toct/PassV12,
  author       = {Rafael Pass and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {A Parallel Repetition Theorem for Constant-Round Arthur-Merlin Proofs},
  journal      = {{ACM} Trans. Comput. Theory},
  volume       = {4},
  number       = {4},
  pages        = {10:1--10:22},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382559.2382561},
  doi          = {10.1145/2382559.2382561},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toct/PassV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AmesGV12,
  author       = {Scott Ames and
                  Rosario Gennaro and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {The Generalized Randomized Iterate and Its Application to New Efficient
                  Constructions of UOWHFs from Regular One-Way Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {154--171},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_11},
  doi          = {10.1007/978-3-642-34961-4\_11},
  timestamp    = {Mon, 25 Nov 2019 15:32:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AmesGV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PassLV12,
  author       = {Rafael Pass and
                  Huijia Lin and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {A Unified Framework for {UC} from Only {OT}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {699--717},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_42},
  doi          = {10.1007/978-3-642-34961-4\_42},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PassLV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Venkitasubramaniam11,
  author       = {Muthuramakrishnan Venkitasubramaniam},
  title        = {Unified Framework for Concurrent Security},
  school       = {Cornell University, {USA}},
  year         = {2011},
  timestamp    = {Thu, 07 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Venkitasubramaniam11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/PassTV11,
  author       = {Rafael Pass and
                  Wei{-}Lung Dustin Tseng and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Yuval Ishai},
  title        = {Towards Non-Black-Box Lower Bounds in Cryptography},
  booktitle    = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC}
                  2011, Providence, RI, USA, March 28-30, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6597},
  pages        = {579--596},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19571-6\_35},
  doi          = {10.1007/978-3-642-19571-6\_35},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/PassTV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Dachman-SoledMRV11,
  author       = {Dana Dachman{-}Soled and
                  Tal Malkin and
                  Mariana Raykova and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Adaptive and Concurrent Secure Computation from New Notions of Non-Malleability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {611},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/611},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Dachman-SoledMRV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/LinPTV10,
  author       = {Huijia Lin and
                  Rafael Pass and
                  Wei{-}Lung Dustin Tseng and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Tal Rabin},
  title        = {Concurrent Non-Malleable Zero Knowledge Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6223},
  pages        = {429--446},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14623-7\_23},
  doi          = {10.1007/978-3-642-14623-7\_23},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/LinPTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/PassTV10,
  author       = {Rafael Pass and
                  Wei{-}Lung Dustin Tseng and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Daniele Micciancio},
  title        = {Eye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing
                  Model},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {518--534},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_31},
  doi          = {10.1007/978-3-642-11799-2\_31},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/PassTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/PassV10,
  author       = {Rafael Pass and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Daniele Micciancio},
  title        = {Private Coins versus Public Coins in Zero-Knowledge Proof Systems},
  booktitle    = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
                  2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5978},
  pages        = {588--605},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11799-2\_35},
  doi          = {10.1007/978-3-642-11799-2\_35},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/PassV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/LinPV09,
  author       = {Huijia Lin and
                  Rafael Pass and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Michael Mitzenmacher},
  title        = {A unified framework for concurrent security: universal composability
                  from stand-alone non-malleability},
  booktitle    = {Proceedings of the 41st Annual {ACM} Symposium on Theory of Computing,
                  {STOC} 2009, Bethesda, MD, USA, May 31 - June 2, 2009},
  pages        = {179--188},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1536414.1536441},
  doi          = {10.1145/1536414.1536441},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/LinPV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/PandeyPSTV08,
  author       = {Omkant Pandey and
                  Rafael Pass and
                  Amit Sahai and
                  Wei{-}Lung Dustin Tseng and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Nigel P. Smart},
  title        = {Precise Concurrent Zero Knowledge},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {397--414},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_23},
  doi          = {10.1007/978-3-540-78967-3\_23},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/PandeyPSTV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/PassV08,
  author       = {Rafael Pass and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Ran Canetti},
  title        = {On Constant-Round Concurrent Zero-Knowledge},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {553--570},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_30},
  doi          = {10.1007/978-3-540-78524-8\_30},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/PassV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/LinPV08,
  author       = {Huijia Lin and
                  Rafael Pass and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Ran Canetti},
  title        = {Concurrent Non-malleable Commitments from Any One-Way Function},
  booktitle    = {Theory of Cryptography, Fifth Theory of Cryptography Conference, {TCC}
                  2008, New York, USA, March 19-21, 2008},
  series       = {Lecture Notes in Computer Science},
  volume       = {4948},
  pages        = {571--588},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78524-8\_31},
  doi          = {10.1007/978-3-540-78524-8\_31},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/LinPV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkdd/MachanavajjhalaKGV07,
  author       = {Ashwin Machanavajjhala and
                  Daniel Kifer and
                  Johannes Gehrke and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {\emph{L}-diversity: Privacy beyond \emph{k}-anonymity},
  journal      = {{ACM} Trans. Knowl. Discov. Data},
  volume       = {1},
  number       = {1},
  pages        = {3},
  year         = {2007},
  url          = {https://doi.org/10.1145/1217299.1217302},
  doi          = {10.1145/1217299.1217302},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkdd/MachanavajjhalaKGV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/PassV07,
  author       = {Rafael Pass and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {David S. Johnson and
                  Uriel Feige},
  title        = {An efficient parallel repetition theorem for Arthur-Merlin games},
  booktitle    = {Proceedings of the 39th Annual {ACM} Symposium on Theory of Computing,
                  San Diego, California, USA, June 11-13, 2007},
  pages        = {420--429},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1250790.1250853},
  doi          = {10.1145/1250790.1250853},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/PassV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PandeyPSTV07,
  author       = {Omkant Pandey and
                  Rafael Pass and
                  Amit Sahai and
                  Wei{-}Lung Dustin Tseng and
                  Muthuramakrishnan Venkitasubramaniam},
  title        = {Precise Concurrent Zero Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {451},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/451},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PandeyPSTV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/VenkitasubramaniamMMG06,
  author       = {Muthuramakrishnan Venkitasubramaniam and
                  Ashwin Machanavajjhala and
                  David J. Martin and
                  Johannes Gehrke},
  editor       = {Roger S. Barga and
                  Xiaofang Zhou},
  title        = {Trusted {CVS}},
  booktitle    = {Proceedings of the 22nd International Conference on Data Engineering
                  Workshops, {ICDE} 2006, 3-7 April 2006, Atlanta, GA, {USA}},
  pages        = {23},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICDEW.2006.155},
  doi          = {10.1109/ICDEW.2006.155},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/VenkitasubramaniamMMG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/MachanavajjhalaGKV06,
  author       = {Ashwin Machanavajjhala and
                  Johannes Gehrke and
                  Daniel Kifer and
                  Muthuramakrishnan Venkitasubramaniam},
  editor       = {Ling Liu and
                  Andreas Reuter and
                  Kyu{-}Young Whang and
                  Jianjun Zhang},
  title        = {l-Diversity: Privacy Beyond k-Anonymity},
  booktitle    = {Proceedings of the 22nd International Conference on Data Engineering,
                  {ICDE} 2006, 3-8 April 2006, Atlanta, GA, {USA}},
  pages        = {24},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICDE.2006.1},
  doi          = {10.1109/ICDE.2006.1},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/MachanavajjhalaGKV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/RavikantMSSR04,
  author       = {D. V. S. Ravikant and
                  Muthuramakrishnan Venkitasubramaniam and
                  V. Srikanth and
                  K. Srinathan and
                  C. Pandu Rangan},
  editor       = {Soma Chaudhuri and
                  Shay Kutten},
  title        = {Brief announcement: on the round complexity of distributed consensus
                  over synchronous networks},
  booktitle    = {Proceedings of the Twenty-Third Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} 2004, St. John's, Newfoundland, Canada,
                  July 25-28, 2004},
  pages        = {397},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1011767.1011862},
  doi          = {10.1145/1011767.1011862},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/RavikantMSSR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/RavikantMSSR04,
  author       = {D. V. S. Ravikant and
                  Muthuramakrishnan Venkitasubramaniam and
                  V. Srikanth and
                  K. Srinathan and
                  C. Pandu Rangan},
  editor       = {Rachid Guerraoui},
  title        = {On Byzantine Agreement over (2, 3)-Uniform Hypergraphs},
  booktitle    = {Distributed Computing, 18th International Conference, {DISC} 2004,
                  Amsterdam, The Netherlands, October 4-7, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3274},
  pages        = {450--464},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30186-8\_32},
  doi          = {10.1007/978-3-540-30186-8\_32},
  timestamp    = {Wed, 07 Dec 2022 23:11:11 +0100},
  biburl       = {https://dblp.org/rec/conf/wdag/RavikantMSSR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics