BibTeX records: Shashank Agrawal

download as .bib file

@inproceedings{DBLP:conf/cosade/AgrawalBCW23,
  author       = {Shashank Agrawal and
                  Estuardo Alpirez Bock and
                  Yilei Chen and
                  Gaven J. Watson},
  editor       = {Elif Bilge Kavun and
                  Michael Pehl},
  title        = {White-Box Cryptography with Global Device Binding from Message-Recoverable
                  Signatures and Token-Based Obfuscation},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 14th International
                  Workshop, {COSADE} 2023, Munich, Germany, April 3-4, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13979},
  pages        = {241--261},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-29497-6\_12},
  doi          = {10.1007/978-3-031-29497-6\_12},
  timestamp    = {Sat, 25 Mar 2023 17:25:06 +0100},
  biburl       = {https://dblp.org/rec/conf/cosade/AgrawalBCW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AgrawalAPRS23,
  author       = {Shashank Agrawal and
                  Shweta Agrawal and
                  Manoj Prabhakaran and
                  Rajeev Raghunath and
                  Jayesh Singla},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {{CASE:} {A} New Frontier in Public-Key Authenticated Encryption},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14370},
  pages        = {189--219},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48618-0\_7},
  doi          = {10.1007/978-3-031-48618-0\_7},
  timestamp    = {Wed, 06 Dec 2023 13:56:15 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AgrawalAPRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalAPRS23,
  author       = {Shashank Agrawal and
                  Shweta Agrawal and
                  Manoj Prabhakaran and
                  Rajeev Raghunath and
                  Jayesh Singla},
  title        = {{CASE:} {A} New Frontier in Public-Key Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1786},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1786},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalAPRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imst/RajputARV22,
  author       = {Gunjan Rajput and
                  Shashank Agrawal and
                  Gopal Raut and
                  Santosh Kumar Vishvakarma},
  title        = {An accurate and noninvasive skin cancer screening based on imaging
                  technique},
  journal      = {Int. J. Imaging Syst. Technol.},
  volume       = {32},
  number       = {1},
  pages        = {354--368},
  year         = {2022},
  url          = {https://doi.org/10.1002/ima.22616},
  doi          = {10.1002/IMA.22616},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imst/RajputARV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imst/RajputABV22,
  author       = {Gunjan Rajput and
                  Shashank Agrawal and
                  Kunika Naresh Biyani and
                  Santosh Kumar Vishvakarma},
  title        = {Early breast cancer diagnosis using cogent activation function-based
                  deep learning implementation on screened mammograms},
  journal      = {Int. J. Imaging Syst. Technol.},
  volume       = {32},
  number       = {4},
  pages        = {1101--1118},
  year         = {2022},
  url          = {https://doi.org/10.1002/ima.22701},
  doi          = {10.1002/IMA.22701},
  timestamp    = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imst/RajputABV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/AgrawalDLMR22,
  author       = {Shashank Agrawal and
                  Wei Dai and
                  Atul Luykx and
                  Pratyay Mukherjee and
                  Peter Rindal},
  editor       = {Takanori Isobe and
                  Santanu Sarkar},
  title        = {ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious
                  Model},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2022 - 23rd International Conference
                  on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13774},
  pages        = {26--51},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22912-1\_2},
  doi          = {10.1007/978-3-031-22912-1\_2},
  timestamp    = {Fri, 25 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/AgrawalDLMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Agrawal22,
  author       = {Shashank Agrawal},
  title        = {Secure Plot Transfer for the Chia Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {871},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/871},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Agrawal22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalDLMR22,
  author       = {Shashank Agrawal and
                  Wei Dai and
                  Atul Luykx and
                  Pratyay Mukherjee and
                  Peter Rindal},
  title        = {ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1449},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1449},
  timestamp    = {Fri, 25 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalDLMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SalajeghehASCM22,
  author       = {Mastooreh Salajegheh and
                  Shashank Agrawal and
                  Maliheh Shirvanian and
                  Mihai Christodorescu and
                  Payman Mohassel},
  title        = {CoRA: Collaborative Risk-Aware Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1685},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1685},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SalajeghehASCM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ShirvanianA21,
  author       = {Maliheh Shirvanian and
                  Shashank Agrawal},
  title        = {2D-2FA: {A} New Dimension in Two-Factor Authentication},
  booktitle    = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual
                  Event, USA, December 6 - 10, 2021},
  pages        = {482--496},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485832.3485910},
  doi          = {10.1145/3485832.3485910},
  timestamp    = {Tue, 07 Dec 2021 18:41:40 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ShirvanianA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AgrawalBMMP21,
  author       = {Shashank Agrawal and
                  Saikrishna Badrinarayanan and
                  Payman Mohassel and
                  Pratyay Mukherjee and
                  Sikhar Patranabis},
  editor       = {Juan A. Garay},
  title        = {{BETA:} Biometric-Enabled Threshold Authentication},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {290--318},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_11},
  doi          = {10.1007/978-3-030-75248-4\_11},
  timestamp    = {Fri, 07 May 2021 15:40:46 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AgrawalBMMP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-15872,
  author       = {Maliheh Shirvanian and
                  Shashank Agrawal},
  title        = {2D-2FA: {A} New Dimension in Two-Factor Authentication},
  journal      = {CoRR},
  volume       = {abs/2110.15872},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.15872},
  eprinttype    = {arXiv},
  eprint       = {2110.15872},
  timestamp    = {Tue, 02 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-15872.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalBCW21,
  author       = {Shashank Agrawal and
                  Estuardo Alpirez Bock and
                  Yilei Chen and
                  Gaven J. Watson},
  title        = {White-box Cryptography with Device Binding from Token-based Obfuscation
                  and more},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {767},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/767},
  timestamp    = {Tue, 22 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalBCW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AgrawalR20,
  author       = {Shashank Agrawal and
                  Srinivasan Raghuraman},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {KVaC: Key-Value Commitments for Blockchains and Beyond},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12493},
  pages        = {839--869},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64840-4\_28},
  doi          = {10.1007/978-3-030-64840-4\_28},
  timestamp    = {Thu, 10 Dec 2020 10:11:44 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AgrawalR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AgrawalBMR20,
  author       = {Shashank Agrawal and
                  Saikrishna Badrinarayanan and
                  Pratyay Mukherjee and
                  Peter Rindal},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing
                  Biometric Matching},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {1351--1370},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417287},
  doi          = {10.1145/3372297.3417287},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AgrawalBMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BunzAZB20,
  author       = {Benedikt B{\"{u}}nz and
                  Shashank Agrawal and
                  Mahdi Zamani and
                  Dan Boneh},
  editor       = {Joseph Bonneau and
                  Nadia Heninger},
  title        = {Zether: Towards Privacy in a Smart Contract World},
  booktitle    = {Financial Cryptography and Data Security - 24th International Conference,
                  {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12059},
  pages        = {423--443},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-51280-4\_23},
  doi          = {10.1007/978-3-030-51280-4\_23},
  timestamp    = {Wed, 22 Jul 2020 12:13:31 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/BunzAZB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalBMMP20,
  author       = {Shashank Agrawal and
                  Saikrishna Badrinarayanan and
                  Payman Mohassel and
                  Pratyay Mukherjee and
                  Sikhar Patranabis},
  title        = {{BETA:} Biometric Enabled Threshold Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {679},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/679},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalBMMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalR20,
  author       = {Shashank Agrawal and
                  Srinivasan Raghuraman},
  title        = {KVaC: Key-Value Commitments for Blockchains and Beyond},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1161},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1161},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalBMR20,
  author       = {Shashank Agrawal and
                  Saikrishna Badrinarayanan and
                  Pratyay Mukherjee and
                  Peter Rindal},
  title        = {Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing
                  Biometric Matching},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1363},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1363},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalBMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BunzAZB19,
  author       = {Benedikt B{\"{u}}nz and
                  Shashank Agrawal and
                  Mahdi Zamani and
                  Dan Boneh},
  title        = {Zether: Towards Privacy in a Smart Contract World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {191},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/191},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BunzAZB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AgrawalMMR18,
  author       = {Shashank Agrawal and
                  Payman Mohassel and
                  Pratyay Mukherjee and
                  Peter Rindal},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {DiSE: Distributed Symmetric-key Encryption},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {1993--2010},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243774},
  doi          = {10.1145/3243734.3243774},
  timestamp    = {Tue, 10 Nov 2020 20:00:51 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AgrawalMMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AgrawalMMM18,
  author       = {Shashank Agrawal and
                  Peihan Miao and
                  Payman Mohassel and
                  Pratyay Mukherjee},
  editor       = {David Lie and
                  Mohammad Mannan and
                  Michael Backes and
                  XiaoFeng Wang},
  title        = {{PASTA:} PASsword-based Threshold Authentication},
  booktitle    = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2018, Toronto, ON, Canada, October
                  15-19, 2018},
  pages        = {2042--2059},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3243734.3243839},
  doi          = {10.1145/3243734.3243839},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AgrawalMMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalGM18,
  author       = {Shashank Agrawal and
                  Chaya Ganesh and
                  Payman Mohassel},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Non-Interactive Zero-Knowledge Proofs for Composite Statements},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10993},
  pages        = {643--673},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96878-0\_22},
  doi          = {10.1007/978-3-319-96878-0\_22},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AgrawalKW18,
  author       = {Shashank Agrawal and
                  Venkata Koppula and
                  Brent Waters},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Impossibility of Simulation Secure Functional Encryption Even with
                  Random Oracles},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {659--688},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_24},
  doi          = {10.1007/978-3-030-03807-6\_24},
  timestamp    = {Sat, 09 Apr 2022 12:44:08 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AgrawalKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalGM18,
  author       = {Shashank Agrawal and
                  Chaya Ganesh and
                  Payman Mohassel},
  title        = {Non-Interactive Zero-Knowledge Proofs for Composite Statements},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {557},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/557},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalGM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalMMR18,
  author       = {Shashank Agrawal and
                  Payman Mohassel and
                  Pratyay Mukherjee and
                  Peter Rindal},
  title        = {DiSE: Distributed Symmetric-key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {727},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/727},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalMMR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalMMM18,
  author       = {Shashank Agrawal and
                  Peihan Miao and
                  Payman Mohassel and
                  Pratyay Mukherjee},
  title        = {{PASTA:} PASsword-based Threshold Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {885},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/885},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalMMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AgrawalC17,
  author       = {Shashank Agrawal and
                  Melissa Chase},
  editor       = {Bhavani Thuraisingham and
                  David Evans and
                  Tal Malkin and
                  Dongyan Xu},
  title        = {{FAME:} Fast Attribute-based Message Encryption},
  booktitle    = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
                  November 03, 2017},
  pages        = {665--682},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3133956.3134014},
  doi          = {10.1145/3133956.3134014},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AgrawalC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AgrawalW17,
  author       = {Shashank Agrawal and
                  David J. Wu},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Functional Encryption: Deterministic to Randomized Functions from
                  Simple Assumptions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10211},
  pages        = {30--61},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56614-6\_2},
  doi          = {10.1007/978-3-319-56614-6\_2},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AgrawalW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AgrawalC17,
  author       = {Shashank Agrawal and
                  Melissa Chase},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Simplifying Design and Analysis of Complex Predicate Encryption Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10210},
  pages        = {627--656},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56620-7\_22},
  doi          = {10.1007/978-3-319-56620-7\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AgrawalC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalC17,
  author       = {Shashank Agrawal and
                  Melissa Chase},
  title        = {Simplifying Design and Analysis of Complex Predicate Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {233},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/233},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalC17a,
  author       = {Shashank Agrawal and
                  Melissa Chase},
  title        = {{FAME:} Fast Attribute-based Message Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {807},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/807},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalC17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AgrawalC16,
  author       = {Shashank Agrawal and
                  Melissa Chase},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {A Study of Pair Encodings: Predicate Encryption in Prime Order Groups},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9563},
  pages        = {259--288},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49099-0\_10},
  doi          = {10.1007/978-3-662-49099-0\_10},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AgrawalC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AgrawalPY16,
  author       = {Shashank Agrawal and
                  Manoj Prabhakaran and
                  Ching{-}Hua Yu},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Virtual Grey-Boxes Beyond Obfuscation: {A} Statistical Security Notion
                  for Cryptographic Agents},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {269--296},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_11},
  doi          = {10.1007/978-3-662-53644-5\_11},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AgrawalPY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AggarwalA0MPP16,
  author       = {Divesh Aggarwal and
                  Shashank Agrawal and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Omkant Pandey and
                  Manoj Prabhakaran},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Optimal Computational Split-state Non-malleable Codes},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9563},
  pages        = {393--417},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49099-0\_15},
  doi          = {10.1007/978-3-662-49099-0\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AggarwalA0MPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalW16,
  author       = {Shashank Agrawal and
                  David J. Wu},
  title        = {Functional Encryption: Deterministic to Randomized Functions from
                  Simple Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {482},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/482},
  timestamp    = {Sun, 11 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalPY16,
  author       = {Shashank Agrawal and
                  Manoj Prabhakaran and
                  Ching{-}Hua Yu},
  title        = {Virtual Grey-Boxes Beyond Obfuscation: {A} Statistical Security Notion
                  for Cryptographic Agents},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {819},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/819},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalPY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalKW16,
  author       = {Shashank Agrawal and
                  Venkata Koppula and
                  Brent Waters},
  title        = {Impossibility of Simulation Secure Functional Encryption Even with
                  Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {959},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/959},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalKW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Agrawal15,
  author       = {Shashank Agrawal},
  title        = {Cryptographic agents},
  school       = {University of Illinois Urbana-Champaign, {USA}},
  year         = {2015},
  url          = {https://hdl.handle.net/2142/89129},
  timestamp    = {Sat, 29 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Agrawal15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/crossroads/Agrawal15,
  author       = {Shashank Agrawal},
  title        = {Alice and Bob in the new world},
  journal      = {{XRDS}},
  volume       = {21},
  number       = {3},
  pages        = {8--9},
  year         = {2015},
  url          = {https://doi.org/10.1145/2748114},
  doi          = {10.1145/2748114},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/crossroads/Agrawal15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/crossroads/AgrawalR15,
  author       = {Shashank Agrawal and
                  Billy Rathje},
  title        = {Kristin Lauter on Cryptography and Mathematics},
  journal      = {{XRDS}},
  volume       = {21},
  number       = {3},
  pages        = {20--22},
  year         = {2015},
  url          = {https://doi.org/10.1145/2730916},
  doi          = {10.1145/2730916},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/crossroads/AgrawalR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Agrawal0MPP15,
  author       = {Shashank Agrawal and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Omkant Pandey and
                  Manoj Prabhakaran},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {538--557},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_26},
  doi          = {10.1007/978-3-662-47989-6\_26},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Agrawal0MPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AgrawalAP15,
  author       = {Shashank Agrawal and
                  Shweta Agrawal and
                  Manoj Prabhakaran},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted
                  Data},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9057},
  pages        = {501--531},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46803-6\_17},
  doi          = {10.1007/978-3-662-46803-6\_17},
  timestamp    = {Thu, 14 Oct 2021 09:58:15 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AgrawalAP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AgrawalABKPS15,
  author       = {Shashank Agrawal and
                  Shweta Agrawal and
                  Saikrishna Badrinarayanan and
                  Abishek Kumarasubramanian and
                  Manoj Prabhakaran and
                  Amit Sahai},
  editor       = {Jonathan Katz},
  title        = {On the Practical Security of Inner Product Functional Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
                  USA, March 30 - April 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9020},
  pages        = {777--798},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46447-2\_35},
  doi          = {10.1007/978-3-662-46447-2\_35},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AgrawalABKPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Agrawal0MPP15,
  author       = {Shashank Agrawal and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Omkant Pandey and
                  Manoj Prabhakaran},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise
                  Tampering and Permutations},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {375--397},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_16},
  doi          = {10.1007/978-3-662-46494-6\_16},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Agrawal0MPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalC15,
  author       = {Shashank Agrawal and
                  Melissa Chase},
  title        = {A study of Pair Encodings: Predicate Encryption in prime order groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {413},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/413},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalA0MPP15,
  author       = {Divesh Aggarwal and
                  Shashank Agrawal and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Omkant Pandey and
                  Manoj Prabhakaran},
  title        = {Optimal Computational Split-state Non-malleable Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1063},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalA0MPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NaveedAPWAHG14,
  author       = {Muhammad Naveed and
                  Shashank Agrawal and
                  Manoj Prabhakaran and
                  XiaoFeng Wang and
                  Erman Ayday and
                  Jean{-}Pierre Hubaux and
                  Carl A. Gunter},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Controlled Functional Encryption},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1280--1291},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660291},
  doi          = {10.1145/2660267.2660291},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NaveedAPWAHG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AgrawalAGPR14,
  author       = {Shashank Agrawal and
                  Prabhanjan Ananth and
                  Vipul Goyal and
                  Manoj Prabhakaran and
                  Alon Rosen},
  editor       = {Yehuda Lindell},
  title        = {Lower Bounds in the Hardware Token Model},
  booktitle    = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
                  2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8349},
  pages        = {663--687},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54242-8\_28},
  doi          = {10.1007/978-3-642-54242-8\_28},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AgrawalAGPR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/AgrawalGMPP14,
  author       = {Shashank Agrawal and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Omkant Pandey and
                  Manoj Prabhakaran},
  title        = {Explicit Non-Malleable Codes Resistant to Permutations},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR14-069}},
  year         = {2014},
  url          = {https://eccc.weizmann.ac.il/report/2014/069},
  eprinttype    = {ECCC},
  eprint       = {TR14-069},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/AgrawalGMPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalGMPP14,
  author       = {Shashank Agrawal and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Omkant Pandey and
                  Manoj Prabhakaran},
  title        = {Explicit Non-Malleable Codes Resistant to Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/316},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalGMPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalAP14,
  author       = {Shashank Agrawal and
                  Shweta Agrawal and
                  Manoj Prabhakaran},
  title        = {Towards a Unified Theory of Cryptographic Agents},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {480},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/480},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalAP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalGMPP14a,
  author       = {Shashank Agrawal and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Omkant Pandey and
                  Manoj Prabhakaran},
  title        = {Explicit Non-malleable Codes Resistant to Permutations and Perturbations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {841},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/841},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalGMPP14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalGMPP14b,
  author       = {Shashank Agrawal and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Omkant Pandey and
                  Manoj Prabhakaran},
  title        = {Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering
                  and Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {842},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/842},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalGMPP14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/MehtaAS13,
  author       = {Abhinav Mehta and
                  Shashank Agrawal and
                  Kannan Srinathan},
  title        = {Interplay between (im)perfectness, synchrony and connectivity: The
                  case of reliable message transmission},
  journal      = {Theor. Comput. Sci.},
  volume       = {496},
  pages        = {2--16},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.tcs.2012.12.004},
  doi          = {10.1016/J.TCS.2012.12.004},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/MehtaAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcca/AgrawalSM13,
  author       = {Shashank Agrawal and
                  Chandra Sekhar Sekhar and
                  S. Mishra},
  title        = {Control of single-phase grid connected {PV} power plant for real as
                  well as reactive power feeding},
  booktitle    = {Proceedings of the {IEEE} International Conference on Control Applications,
                  {CCA} 2013, Hyderabad, India, August 28-30, 2013},
  pages        = {667--672},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CCA.2013.6662826},
  doi          = {10.1109/CCA.2013.6662826},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEcca/AgrawalSM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AgrawalP13,
  author       = {Shashank Agrawal and
                  Manoj Prabhakaran},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {On Fair Exchange, Fair Coins and Fair Sampling},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8042},
  pages        = {259--276},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40041-4\_15},
  doi          = {10.1007/978-3-642-40041-4\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AgrawalP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalP13,
  author       = {Shashank Agrawal and
                  Manoj Prabhakaran},
  title        = {On Fair Exchange, Fair Coins and Fair Sampling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {442},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/442},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalABKPS13,
  author       = {Shashank Agrawal and
                  Shweta Agrawal and
                  Saikrishna Badrinarayanan and
                  Abishek Kumarasubramanian and
                  Manoj Prabhakaran and
                  Amit Sahai},
  title        = {Function Private Functional Encryption and Property Preserving Encryption
                  : New Definitions and Positive Results},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {744},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/744},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalABKPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalAGPR13,
  author       = {Shashank Agrawal and
                  Prabhanjan Ananth and
                  Vipul Goyal and
                  Manoj Prabhakaran and
                  Alon Rosen},
  title        = {Lower Bounds in the Hardware Token Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {827},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/827},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalAGPR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Agrawal12,
  author       = {Shashank Agrawal},
  title        = {Verifiable secret sharing in a total of three rounds},
  journal      = {Inf. Process. Lett.},
  volume       = {112},
  number       = {22},
  pages        = {856--859},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.ipl.2012.08.003},
  doi          = {10.1016/J.IPL.2012.08.003},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Agrawal12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcn/MehtaAS12,
  author       = {Abhinav Mehta and
                  Shashank Agrawal and
                  Kannan Srinathan},
  editor       = {Luciano Bononi and
                  Ajoy Kumar Datta and
                  St{\'{e}}phane Devismes and
                  Archan Misra},
  title        = {Interplay between (Im)perfectness, Synchrony and Connectivity: The
                  Case of Reliable Message Transmission},
  booktitle    = {Distributed Computing and Networking - 13th International Conference,
                  {ICDCN} 2012, Hong Kong, China, January 3-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7129},
  pages        = {138--152},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-25959-3\_10},
  doi          = {10.1007/978-3-642-25959-3\_10},
  timestamp    = {Mon, 26 Jun 2023 20:44:19 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcn/MehtaAS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/NayakAS11,
  author       = {Manan Nayak and
                  Shashank Agrawal and
                  Kannan Srinathan},
  editor       = {Serge Fehr},
  title        = {Minimal Connectivity for Unconditionally Secure Message Transmission
                  in Synchronous Directed Networks},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {32--51},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_4},
  doi          = {10.1007/978-3-642-20728-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/NayakAS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/AgrawalMS11,
  author       = {Shashank Agrawal and
                  Abhinav Mehta and
                  Kannan Srinathan},
  editor       = {Daniel J. Bernstein and
                  Sanjit Chatterjee},
  title        = {Secure Message Transmission in Asynchronous Directed Graphs},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference
                  on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7107},
  pages        = {359--378},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25578-6\_26},
  doi          = {10.1007/978-3-642-25578-6\_26},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/AgrawalMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalMS11,
  author       = {Shashank Agrawal and
                  Abhinav Mehta and
                  Kannan Srinathan},
  title        = {Secure Message Transmission In Asynchronous Directed Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {13},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/013},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalMS11a,
  author       = {Shashank Agrawal and
                  Abhinav Mehta and
                  Kannan Srinathan},
  title        = {Unconditionally Reliable Message Transmission in Directed Neighbour
                  Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {14},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/014},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalMS11a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NayakAS11,
  author       = {Manan Nayak and
                  Shashank Agrawal and
                  Kannan Srinathan},
  title        = {Minimal Connectivity for Unconditionally Secure Message Transmission
                  in Synchronous Directed Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {320},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/320},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NayakAS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wdag/MehtaAS10,
  author       = {Abhinav Mehta and
                  Shashank Agrawal and
                  Kannan Srinathan},
  editor       = {Nancy A. Lynch and
                  Alexander A. Shvartsman},
  title        = {Brief Announcement: Synchronous Las Vegas {URMT} Iff Asynchronous
                  Monte Carlo {URMT}},
  booktitle    = {Distributed Computing, 24th International Symposium, {DISC} 2010,
                  Cambridge, MA, USA, September 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6343},
  pages        = {201--203},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15763-9\_20},
  doi          = {10.1007/978-3-642-15763-9\_20},
  timestamp    = {Sun, 25 Jul 2021 11:53:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wdag/MehtaAS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MehtaAS10,
  author       = {Abhinav Mehta and
                  Shashank Agrawal and
                  Kannan Srinathan},
  title        = {Interplay between (Im)perfectness, Synchrony and Connectivity: The
                  Case of Reliable Message Transmission},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {392},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/392},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MehtaAS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics