Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Shashank Agrawal
@inproceedings{DBLP:conf/cosade/AgrawalBCW23, author = {Shashank Agrawal and Estuardo Alpirez Bock and Yilei Chen and Gaven J. Watson}, editor = {Elif Bilge Kavun and Michael Pehl}, title = {White-Box Cryptography with Global Device Binding from Message-Recoverable Signatures and Token-Based Obfuscation}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 14th International Workshop, {COSADE} 2023, Munich, Germany, April 3-4, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13979}, pages = {241--261}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-29497-6\_12}, doi = {10.1007/978-3-031-29497-6\_12}, timestamp = {Sat, 25 Mar 2023 17:25:06 +0100}, biburl = {https://dblp.org/rec/conf/cosade/AgrawalBCW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AgrawalAPRS23, author = {Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran and Rajeev Raghunath and Jayesh Singla}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {{CASE:} {A} New Frontier in Public-Key Authenticated Encryption}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14370}, pages = {189--219}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48618-0\_7}, doi = {10.1007/978-3-031-48618-0\_7}, timestamp = {Wed, 06 Dec 2023 13:56:15 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AgrawalAPRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalAPRS23, author = {Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran and Rajeev Raghunath and Jayesh Singla}, title = {{CASE:} {A} New Frontier in Public-Key Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1786}, year = {2023}, url = {https://eprint.iacr.org/2023/1786}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalAPRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imst/RajputARV22, author = {Gunjan Rajput and Shashank Agrawal and Gopal Raut and Santosh Kumar Vishvakarma}, title = {An accurate and noninvasive skin cancer screening based on imaging technique}, journal = {Int. J. Imaging Syst. Technol.}, volume = {32}, number = {1}, pages = {354--368}, year = {2022}, url = {https://doi.org/10.1002/ima.22616}, doi = {10.1002/IMA.22616}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imst/RajputARV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imst/RajputABV22, author = {Gunjan Rajput and Shashank Agrawal and Kunika Naresh Biyani and Santosh Kumar Vishvakarma}, title = {Early breast cancer diagnosis using cogent activation function-based deep learning implementation on screened mammograms}, journal = {Int. J. Imaging Syst. Technol.}, volume = {32}, number = {4}, pages = {1101--1118}, year = {2022}, url = {https://doi.org/10.1002/ima.22701}, doi = {10.1002/IMA.22701}, timestamp = {Mon, 08 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imst/RajputABV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/AgrawalDLMR22, author = {Shashank Agrawal and Wei Dai and Atul Luykx and Pratyay Mukherjee and Peter Rindal}, editor = {Takanori Isobe and Santanu Sarkar}, title = {ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2022 - 23rd International Conference on Cryptology in India, Kolkata, India, December 11-14, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13774}, pages = {26--51}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22912-1\_2}, doi = {10.1007/978-3-031-22912-1\_2}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/AgrawalDLMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Agrawal22, author = {Shashank Agrawal}, title = {Secure Plot Transfer for the Chia Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {871}, year = {2022}, url = {https://eprint.iacr.org/2022/871}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Agrawal22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalDLMR22, author = {Shashank Agrawal and Wei Dai and Atul Luykx and Pratyay Mukherjee and Peter Rindal}, title = {ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1449}, year = {2022}, url = {https://eprint.iacr.org/2022/1449}, timestamp = {Fri, 25 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalDLMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SalajeghehASCM22, author = {Mastooreh Salajegheh and Shashank Agrawal and Maliheh Shirvanian and Mihai Christodorescu and Payman Mohassel}, title = {CoRA: Collaborative Risk-Aware Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1685}, year = {2022}, url = {https://eprint.iacr.org/2022/1685}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SalajeghehASCM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ShirvanianA21, author = {Maliheh Shirvanian and Shashank Agrawal}, title = {2D-2FA: {A} New Dimension in Two-Factor Authentication}, booktitle = {{ACSAC} '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6 - 10, 2021}, pages = {482--496}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3485832.3485910}, doi = {10.1145/3485832.3485910}, timestamp = {Tue, 07 Dec 2021 18:41:40 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ShirvanianA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AgrawalBMMP21, author = {Shashank Agrawal and Saikrishna Badrinarayanan and Payman Mohassel and Pratyay Mukherjee and Sikhar Patranabis}, editor = {Juan A. Garay}, title = {{BETA:} Biometric-Enabled Threshold Authentication}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12711}, pages = {290--318}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75248-4\_11}, doi = {10.1007/978-3-030-75248-4\_11}, timestamp = {Fri, 07 May 2021 15:40:46 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AgrawalBMMP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-15872, author = {Maliheh Shirvanian and Shashank Agrawal}, title = {2D-2FA: {A} New Dimension in Two-Factor Authentication}, journal = {CoRR}, volume = {abs/2110.15872}, year = {2021}, url = {https://arxiv.org/abs/2110.15872}, eprinttype = {arXiv}, eprint = {2110.15872}, timestamp = {Tue, 02 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-15872.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalBCW21, author = {Shashank Agrawal and Estuardo Alpirez Bock and Yilei Chen and Gaven J. Watson}, title = {White-box Cryptography with Device Binding from Token-based Obfuscation and more}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {767}, year = {2021}, url = {https://eprint.iacr.org/2021/767}, timestamp = {Tue, 22 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalBCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AgrawalR20, author = {Shashank Agrawal and Srinivasan Raghuraman}, editor = {Shiho Moriai and Huaxiong Wang}, title = {KVaC: Key-Value Commitments for Blockchains and Beyond}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {839--869}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_28}, doi = {10.1007/978-3-030-64840-4\_28}, timestamp = {Thu, 10 Dec 2020 10:11:44 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AgrawalR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AgrawalBMR20, author = {Shashank Agrawal and Saikrishna Badrinarayanan and Pratyay Mukherjee and Peter Rindal}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {1351--1370}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417287}, doi = {10.1145/3372297.3417287}, timestamp = {Tue, 10 Nov 2020 19:56:39 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AgrawalBMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BunzAZB20, author = {Benedikt B{\"{u}}nz and Shashank Agrawal and Mahdi Zamani and Dan Boneh}, editor = {Joseph Bonneau and Nadia Heninger}, title = {Zether: Towards Privacy in a Smart Contract World}, booktitle = {Financial Cryptography and Data Security - 24th International Conference, {FC} 2020, Kota Kinabalu, Malaysia, February 10-14, 2020 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12059}, pages = {423--443}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-51280-4\_23}, doi = {10.1007/978-3-030-51280-4\_23}, timestamp = {Wed, 22 Jul 2020 12:13:31 +0200}, biburl = {https://dblp.org/rec/conf/fc/BunzAZB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalBMMP20, author = {Shashank Agrawal and Saikrishna Badrinarayanan and Payman Mohassel and Pratyay Mukherjee and Sikhar Patranabis}, title = {{BETA:} Biometric Enabled Threshold Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {679}, year = {2020}, url = {https://eprint.iacr.org/2020/679}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalBMMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalR20, author = {Shashank Agrawal and Srinivasan Raghuraman}, title = {KVaC: Key-Value Commitments for Blockchains and Beyond}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1161}, year = {2020}, url = {https://eprint.iacr.org/2020/1161}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalBMR20, author = {Shashank Agrawal and Saikrishna Badrinarayanan and Pratyay Mukherjee and Peter Rindal}, title = {Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1363}, year = {2020}, url = {https://eprint.iacr.org/2020/1363}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalBMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BunzAZB19, author = {Benedikt B{\"{u}}nz and Shashank Agrawal and Mahdi Zamani and Dan Boneh}, title = {Zether: Towards Privacy in a Smart Contract World}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {191}, year = {2019}, url = {https://eprint.iacr.org/2019/191}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BunzAZB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AgrawalMMR18, author = {Shashank Agrawal and Payman Mohassel and Pratyay Mukherjee and Peter Rindal}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {DiSE: Distributed Symmetric-key Encryption}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {1993--2010}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243774}, doi = {10.1145/3243734.3243774}, timestamp = {Tue, 10 Nov 2020 20:00:51 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AgrawalMMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AgrawalMMM18, author = {Shashank Agrawal and Peihan Miao and Payman Mohassel and Pratyay Mukherjee}, editor = {David Lie and Mohammad Mannan and Michael Backes and XiaoFeng Wang}, title = {{PASTA:} PASsword-based Threshold Authentication}, booktitle = {Proceedings of the 2018 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2018, Toronto, ON, Canada, October 15-19, 2018}, pages = {2042--2059}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3243734.3243839}, doi = {10.1145/3243734.3243839}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AgrawalMMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalGM18, author = {Shashank Agrawal and Chaya Ganesh and Payman Mohassel}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Non-Interactive Zero-Knowledge Proofs for Composite Statements}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10993}, pages = {643--673}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96878-0\_22}, doi = {10.1007/978-3-319-96878-0\_22}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AgrawalKW18, author = {Shashank Agrawal and Venkata Koppula and Brent Waters}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Impossibility of Simulation Secure Functional Encryption Even with Random Oracles}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11239}, pages = {659--688}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03807-6\_24}, doi = {10.1007/978-3-030-03807-6\_24}, timestamp = {Sat, 09 Apr 2022 12:44:08 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AgrawalKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalGM18, author = {Shashank Agrawal and Chaya Ganesh and Payman Mohassel}, title = {Non-Interactive Zero-Knowledge Proofs for Composite Statements}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {557}, year = {2018}, url = {https://eprint.iacr.org/2018/557}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalGM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalMMR18, author = {Shashank Agrawal and Payman Mohassel and Pratyay Mukherjee and Peter Rindal}, title = {DiSE: Distributed Symmetric-key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {727}, year = {2018}, url = {https://eprint.iacr.org/2018/727}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalMMR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalMMM18, author = {Shashank Agrawal and Peihan Miao and Payman Mohassel and Pratyay Mukherjee}, title = {{PASTA:} PASsword-based Threshold Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {885}, year = {2018}, url = {https://eprint.iacr.org/2018/885}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalMMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AgrawalC17, author = {Shashank Agrawal and Melissa Chase}, editor = {Bhavani Thuraisingham and David Evans and Tal Malkin and Dongyan Xu}, title = {{FAME:} Fast Attribute-based Message Encryption}, booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 - November 03, 2017}, pages = {665--682}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3133956.3134014}, doi = {10.1145/3133956.3134014}, timestamp = {Wed, 29 Jun 2022 15:37:41 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AgrawalC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgrawalW17, author = {Shashank Agrawal and David J. Wu}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10211}, pages = {30--61}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56614-6\_2}, doi = {10.1007/978-3-319-56614-6\_2}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgrawalW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgrawalC17, author = {Shashank Agrawal and Melissa Chase}, editor = {Jean{-}S{\'{e}}bastien Coron and Jesper Buus Nielsen}, title = {Simplifying Design and Analysis of Complex Predicate Encryption Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10210}, pages = {627--656}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-56620-7\_22}, doi = {10.1007/978-3-319-56620-7\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgrawalC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalC17, author = {Shashank Agrawal and Melissa Chase}, title = {Simplifying Design and Analysis of Complex Predicate Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {233}, year = {2017}, url = {http://eprint.iacr.org/2017/233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalC17a, author = {Shashank Agrawal and Melissa Chase}, title = {{FAME:} Fast Attribute-based Message Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {807}, year = {2017}, url = {http://eprint.iacr.org/2017/807}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalC17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AgrawalC16, author = {Shashank Agrawal and Melissa Chase}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {A Study of Pair Encodings: Predicate Encryption in Prime Order Groups}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9563}, pages = {259--288}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49099-0\_10}, doi = {10.1007/978-3-662-49099-0\_10}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AgrawalC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AgrawalPY16, author = {Shashank Agrawal and Manoj Prabhakaran and Ching{-}Hua Yu}, editor = {Martin Hirt and Adam D. Smith}, title = {Virtual Grey-Boxes Beyond Obfuscation: {A} Statistical Security Notion for Cryptographic Agents}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {269--296}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_11}, doi = {10.1007/978-3-662-53644-5\_11}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AgrawalPY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AggarwalA0MPP16, author = {Divesh Aggarwal and Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Optimal Computational Split-state Non-malleable Codes}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9563}, pages = {393--417}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49099-0\_15}, doi = {10.1007/978-3-662-49099-0\_15}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AggarwalA0MPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalW16, author = {Shashank Agrawal and David J. Wu}, title = {Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {482}, year = {2016}, url = {http://eprint.iacr.org/2016/482}, timestamp = {Sun, 11 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalPY16, author = {Shashank Agrawal and Manoj Prabhakaran and Ching{-}Hua Yu}, title = {Virtual Grey-Boxes Beyond Obfuscation: {A} Statistical Security Notion for Cryptographic Agents}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {819}, year = {2016}, url = {http://eprint.iacr.org/2016/819}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalPY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalKW16, author = {Shashank Agrawal and Venkata Koppula and Brent Waters}, title = {Impossibility of Simulation Secure Functional Encryption Even with Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {959}, year = {2016}, url = {http://eprint.iacr.org/2016/959}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalKW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Agrawal15, author = {Shashank Agrawal}, title = {Cryptographic agents}, school = {University of Illinois Urbana-Champaign, {USA}}, year = {2015}, url = {https://hdl.handle.net/2142/89129}, timestamp = {Sat, 29 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Agrawal15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/Agrawal15, author = {Shashank Agrawal}, title = {Alice and Bob in the new world}, journal = {{XRDS}}, volume = {21}, number = {3}, pages = {8--9}, year = {2015}, url = {https://doi.org/10.1145/2748114}, doi = {10.1145/2748114}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/Agrawal15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/crossroads/AgrawalR15, author = {Shashank Agrawal and Billy Rathje}, title = {Kristin Lauter on Cryptography and Mathematics}, journal = {{XRDS}}, volume = {21}, number = {3}, pages = {20--22}, year = {2015}, url = {https://doi.org/10.1145/2730916}, doi = {10.1145/2730916}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/crossroads/AgrawalR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Agrawal0MPP15, author = {Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {538--557}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_26}, doi = {10.1007/978-3-662-47989-6\_26}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Agrawal0MPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgrawalAP15, author = {Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {501--531}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_17}, doi = {10.1007/978-3-662-46803-6\_17}, timestamp = {Thu, 14 Oct 2021 09:58:15 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgrawalAP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AgrawalABKPS15, author = {Shashank Agrawal and Shweta Agrawal and Saikrishna Badrinarayanan and Abishek Kumarasubramanian and Manoj Prabhakaran and Amit Sahai}, editor = {Jonathan Katz}, title = {On the Practical Security of Inner Product Functional Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9020}, pages = {777--798}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46447-2\_35}, doi = {10.1007/978-3-662-46447-2\_35}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AgrawalABKPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Agrawal0MPP15, author = {Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {375--397}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_16}, doi = {10.1007/978-3-662-46494-6\_16}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Agrawal0MPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalC15, author = {Shashank Agrawal and Melissa Chase}, title = {A study of Pair Encodings: Predicate Encryption in prime order groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {413}, year = {2015}, url = {http://eprint.iacr.org/2015/413}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalA0MPP15, author = {Divesh Aggarwal and Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, title = {Optimal Computational Split-state Non-malleable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1063}, year = {2015}, url = {http://eprint.iacr.org/2015/1063}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalA0MPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NaveedAPWAHG14, author = {Muhammad Naveed and Shashank Agrawal and Manoj Prabhakaran and XiaoFeng Wang and Erman Ayday and Jean{-}Pierre Hubaux and Carl A. Gunter}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Controlled Functional Encryption}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1280--1291}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660291}, doi = {10.1145/2660267.2660291}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NaveedAPWAHG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AgrawalAGPR14, author = {Shashank Agrawal and Prabhanjan Ananth and Vipul Goyal and Manoj Prabhakaran and Alon Rosen}, editor = {Yehuda Lindell}, title = {Lower Bounds in the Hardware Token Model}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {663--687}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_28}, doi = {10.1007/978-3-642-54242-8\_28}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AgrawalAGPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/AgrawalGMPP14, author = {Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, title = {Explicit Non-Malleable Codes Resistant to Permutations}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR14-069}}, year = {2014}, url = {https://eccc.weizmann.ac.il/report/2014/069}, eprinttype = {ECCC}, eprint = {TR14-069}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/AgrawalGMPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalGMPP14, author = {Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, title = {Explicit Non-Malleable Codes Resistant to Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2014}, url = {http://eprint.iacr.org/2014/316}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalGMPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalAP14, author = {Shashank Agrawal and Shweta Agrawal and Manoj Prabhakaran}, title = {Towards a Unified Theory of Cryptographic Agents}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {480}, year = {2014}, url = {http://eprint.iacr.org/2014/480}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalAP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalGMPP14a, author = {Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, title = {Explicit Non-malleable Codes Resistant to Permutations and Perturbations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {841}, year = {2014}, url = {http://eprint.iacr.org/2014/841}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalGMPP14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalGMPP14b, author = {Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, title = {Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering and Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {842}, year = {2014}, url = {http://eprint.iacr.org/2014/842}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalGMPP14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/MehtaAS13, author = {Abhinav Mehta and Shashank Agrawal and Kannan Srinathan}, title = {Interplay between (im)perfectness, synchrony and connectivity: The case of reliable message transmission}, journal = {Theor. Comput. Sci.}, volume = {496}, pages = {2--16}, year = {2013}, url = {https://doi.org/10.1016/j.tcs.2012.12.004}, doi = {10.1016/J.TCS.2012.12.004}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/MehtaAS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcca/AgrawalSM13, author = {Shashank Agrawal and Chandra Sekhar Sekhar and S. Mishra}, title = {Control of single-phase grid connected {PV} power plant for real as well as reactive power feeding}, booktitle = {Proceedings of the {IEEE} International Conference on Control Applications, {CCA} 2013, Hyderabad, India, August 28-30, 2013}, pages = {667--672}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CCA.2013.6662826}, doi = {10.1109/CCA.2013.6662826}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/IEEEcca/AgrawalSM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalP13, author = {Shashank Agrawal and Manoj Prabhakaran}, editor = {Ran Canetti and Juan A. Garay}, title = {On Fair Exchange, Fair Coins and Fair Sampling}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8042}, pages = {259--276}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40041-4\_15}, doi = {10.1007/978-3-642-40041-4\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalP13, author = {Shashank Agrawal and Manoj Prabhakaran}, title = {On Fair Exchange, Fair Coins and Fair Sampling}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {442}, year = {2013}, url = {http://eprint.iacr.org/2013/442}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalABKPS13, author = {Shashank Agrawal and Shweta Agrawal and Saikrishna Badrinarayanan and Abishek Kumarasubramanian and Manoj Prabhakaran and Amit Sahai}, title = {Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {744}, year = {2013}, url = {http://eprint.iacr.org/2013/744}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalABKPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalAGPR13, author = {Shashank Agrawal and Prabhanjan Ananth and Vipul Goyal and Manoj Prabhakaran and Alon Rosen}, title = {Lower Bounds in the Hardware Token Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {827}, year = {2013}, url = {http://eprint.iacr.org/2013/827}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalAGPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Agrawal12, author = {Shashank Agrawal}, title = {Verifiable secret sharing in a total of three rounds}, journal = {Inf. Process. Lett.}, volume = {112}, number = {22}, pages = {856--859}, year = {2012}, url = {https://doi.org/10.1016/j.ipl.2012.08.003}, doi = {10.1016/J.IPL.2012.08.003}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Agrawal12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/MehtaAS12, author = {Abhinav Mehta and Shashank Agrawal and Kannan Srinathan}, editor = {Luciano Bononi and Ajoy Kumar Datta and St{\'{e}}phane Devismes and Archan Misra}, title = {Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission}, booktitle = {Distributed Computing and Networking - 13th International Conference, {ICDCN} 2012, Hong Kong, China, January 3-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7129}, pages = {138--152}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-25959-3\_10}, doi = {10.1007/978-3-642-25959-3\_10}, timestamp = {Mon, 26 Jun 2023 20:44:19 +0200}, biburl = {https://dblp.org/rec/conf/icdcn/MehtaAS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/NayakAS11, author = {Manan Nayak and Shashank Agrawal and Kannan Srinathan}, editor = {Serge Fehr}, title = {Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {32--51}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_4}, doi = {10.1007/978-3-642-20728-0\_4}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/NayakAS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/AgrawalMS11, author = {Shashank Agrawal and Abhinav Mehta and Kannan Srinathan}, editor = {Daniel J. Bernstein and Sanjit Chatterjee}, title = {Secure Message Transmission in Asynchronous Directed Graphs}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7107}, pages = {359--378}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25578-6\_26}, doi = {10.1007/978-3-642-25578-6\_26}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/AgrawalMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalMS11, author = {Shashank Agrawal and Abhinav Mehta and Kannan Srinathan}, title = {Secure Message Transmission In Asynchronous Directed Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {13}, year = {2011}, url = {http://eprint.iacr.org/2011/013}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalMS11a, author = {Shashank Agrawal and Abhinav Mehta and Kannan Srinathan}, title = {Unconditionally Reliable Message Transmission in Directed Neighbour Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {14}, year = {2011}, url = {http://eprint.iacr.org/2011/014}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalMS11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NayakAS11, author = {Manan Nayak and Shashank Agrawal and Kannan Srinathan}, title = {Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {320}, year = {2011}, url = {http://eprint.iacr.org/2011/320}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NayakAS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wdag/MehtaAS10, author = {Abhinav Mehta and Shashank Agrawal and Kannan Srinathan}, editor = {Nancy A. Lynch and Alexander A. Shvartsman}, title = {Brief Announcement: Synchronous Las Vegas {URMT} Iff Asynchronous Monte Carlo {URMT}}, booktitle = {Distributed Computing, 24th International Symposium, {DISC} 2010, Cambridge, MA, USA, September 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6343}, pages = {201--203}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15763-9\_20}, doi = {10.1007/978-3-642-15763-9\_20}, timestamp = {Sun, 25 Jul 2021 11:53:35 +0200}, biburl = {https://dblp.org/rec/conf/wdag/MehtaAS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MehtaAS10, author = {Abhinav Mehta and Shashank Agrawal and Kannan Srinathan}, title = {Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {392}, year = {2010}, url = {http://eprint.iacr.org/2010/392}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MehtaAS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.