Остановите войну!
for scientists:
default search action
Shashank Agrawal
- > Home > Persons > Shashank Agrawal
Publications
- 2023
- [c30]Shashank Agrawal, Estuardo Alpirez Bock, Yilei Chen, Gaven J. Watson:
White-Box Cryptography with Global Device Binding from Message-Recoverable Signatures and Token-Based Obfuscation. COSADE 2023: 241-261 - [c29]Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran, Rajeev Raghunath, Jayesh Singla:
CASE: A New Frontier in Public-Key Authenticated Encryption. TCC (2) 2023: 189-219 - [i32]Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran, Rajeev Raghunath, Jayesh Singla:
CASE: A New Frontier in Public-Key Authenticated Encryption. IACR Cryptol. ePrint Arch. 2023: 1786 (2023) - 2022
- [c28]Shashank Agrawal, Wei Dai, Atul Luykx, Pratyay Mukherjee, Peter Rindal:
ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model. INDOCRYPT 2022: 26-51 - [i30]Shashank Agrawal, Wei Dai, Atul Luykx, Pratyay Mukherjee, Peter Rindal:
ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model. IACR Cryptol. ePrint Arch. 2022: 1449 (2022) - [i29]Mastooreh Salajegheh, Shashank Agrawal, Maliheh Shirvanian, Mihai Christodorescu, Payman Mohassel:
CoRA: Collaborative Risk-Aware Authentication. IACR Cryptol. ePrint Arch. 2022: 1685 (2022) - 2021
- [c27]Maliheh Shirvanian, Shashank Agrawal:
2D-2FA: A New Dimension in Two-Factor Authentication. ACSAC 2021: 482-496 - [c26]Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Pratyay Mukherjee, Sikhar Patranabis:
BETA: Biometric-Enabled Threshold Authentication. Public Key Cryptography (2) 2021: 290-318 - [i28]Maliheh Shirvanian, Shashank Agrawal:
2D-2FA: A New Dimension in Two-Factor Authentication. CoRR abs/2110.15872 (2021) - [i27]Shashank Agrawal, Estuardo Alpirez Bock, Yilei Chen, Gaven J. Watson:
White-box Cryptography with Device Binding from Token-based Obfuscation and more. IACR Cryptol. ePrint Arch. 2021: 767 (2021) - 2020
- [c25]Shashank Agrawal, Srinivasan Raghuraman:
KVaC: Key-Value Commitments for Blockchains and Beyond. ASIACRYPT (3) 2020: 839-869 - [c24]Shashank Agrawal, Saikrishna Badrinarayanan, Pratyay Mukherjee, Peter Rindal:
Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching. CCS 2020: 1351-1370 - [c23]Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, Dan Boneh:
Zether: Towards Privacy in a Smart Contract World. Financial Cryptography 2020: 423-443 - [i26]Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Pratyay Mukherjee, Sikhar Patranabis:
BETA: Biometric Enabled Threshold Authentication. IACR Cryptol. ePrint Arch. 2020: 679 (2020) - [i25]Shashank Agrawal, Srinivasan Raghuraman:
KVaC: Key-Value Commitments for Blockchains and Beyond. IACR Cryptol. ePrint Arch. 2020: 1161 (2020) - [i24]Shashank Agrawal, Saikrishna Badrinarayanan, Pratyay Mukherjee, Peter Rindal:
Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching. IACR Cryptol. ePrint Arch. 2020: 1363 (2020) - 2019
- [i23]Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, Dan Boneh:
Zether: Towards Privacy in a Smart Contract World. IACR Cryptol. ePrint Arch. 2019: 191 (2019) - 2018
- [c22]Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal:
DiSE: Distributed Symmetric-key Encryption. CCS 2018: 1993-2010 - [c21]Shashank Agrawal, Peihan Miao, Payman Mohassel, Pratyay Mukherjee:
PASTA: PASsword-based Threshold Authentication. CCS 2018: 2042-2059 - [c20]Shashank Agrawal, Chaya Ganesh, Payman Mohassel:
Non-Interactive Zero-Knowledge Proofs for Composite Statements. CRYPTO (3) 2018: 643-673 - [c19]Shashank Agrawal, Venkata Koppula, Brent Waters:
Impossibility of Simulation Secure Functional Encryption Even with Random Oracles. TCC (1) 2018: 659-688 - [i22]Shashank Agrawal, Chaya Ganesh, Payman Mohassel:
Non-Interactive Zero-Knowledge Proofs for Composite Statements. IACR Cryptol. ePrint Arch. 2018: 557 (2018) - [i21]Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal:
DiSE: Distributed Symmetric-key Encryption. IACR Cryptol. ePrint Arch. 2018: 727 (2018) - [i20]Shashank Agrawal, Peihan Miao, Payman Mohassel, Pratyay Mukherjee:
PASTA: PASsword-based Threshold Authentication. IACR Cryptol. ePrint Arch. 2018: 885 (2018) - 2017
- [c18]Shashank Agrawal, Melissa Chase:
FAME: Fast Attribute-based Message Encryption. CCS 2017: 665-682 - [c17]Shashank Agrawal, David J. Wu:
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions. EUROCRYPT (2) 2017: 30-61 - [c16]Shashank Agrawal, Melissa Chase:
Simplifying Design and Analysis of Complex Predicate Encryption Schemes. EUROCRYPT (1) 2017: 627-656 - [i19]Shashank Agrawal, Melissa Chase:
Simplifying Design and Analysis of Complex Predicate Encryption Schemes. IACR Cryptol. ePrint Arch. 2017: 233 (2017) - [i18]Shashank Agrawal, Melissa Chase:
FAME: Fast Attribute-based Message Encryption. IACR Cryptol. ePrint Arch. 2017: 807 (2017) - 2016
- [c15]Shashank Agrawal, Melissa Chase:
A Study of Pair Encodings: Predicate Encryption in Prime Order Groups. TCC (A2) 2016: 259-288 - [c14]Shashank Agrawal, Manoj Prabhakaran, Ching-Hua Yu:
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents. TCC (B2) 2016: 269-296 - [c13]Divesh Aggarwal, Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Optimal Computational Split-state Non-malleable Codes. TCC (A2) 2016: 393-417 - [i17]Shashank Agrawal, David J. Wu:
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions. IACR Cryptol. ePrint Arch. 2016: 482 (2016) - [i16]Shashank Agrawal, Manoj Prabhakaran, Ching-Hua Yu:
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents. IACR Cryptol. ePrint Arch. 2016: 819 (2016) - [i15]Shashank Agrawal, Venkata Koppula, Brent Waters:
Impossibility of Simulation Secure Functional Encryption Even with Random Oracles. IACR Cryptol. ePrint Arch. 2016: 959 (2016) - 2015
- [c12]Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations. CRYPTO (1) 2015: 538-557 - [c11]Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran:
Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data. EUROCRYPT (2) 2015: 501-531 - [c10]Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, Amit Sahai:
On the Practical Security of Inner Product Functional Encryption. Public Key Cryptography 2015: 777-798 - [c9]Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations. TCC (1) 2015: 375-397 - [i14]Shashank Agrawal, Melissa Chase:
A study of Pair Encodings: Predicate Encryption in prime order groups. IACR Cryptol. ePrint Arch. 2015: 413 (2015) - [i13]Divesh Aggarwal, Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Optimal Computational Split-state Non-malleable Codes. IACR Cryptol. ePrint Arch. 2015: 1063 (2015) - 2014
- [c8]Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, XiaoFeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl A. Gunter:
Controlled Functional Encryption. CCS 2014: 1280-1291 - [c7]Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran, Alon Rosen:
Lower Bounds in the Hardware Token Model. TCC 2014: 663-687 - [i12]Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Explicit Non-Malleable Codes Resistant to Permutations. Electron. Colloquium Comput. Complex. TR14 (2014) - [i11]Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Explicit Non-Malleable Codes Resistant to Permutations. IACR Cryptol. ePrint Arch. 2014: 316 (2014) - [i10]Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran:
Towards a Unified Theory of Cryptographic Agents. IACR Cryptol. ePrint Arch. 2014: 480 (2014) - [i9]Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Explicit Non-malleable Codes Resistant to Permutations and Perturbations. IACR Cryptol. ePrint Arch. 2014: 841 (2014) - [i8]Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering and Permutations. IACR Cryptol. ePrint Arch. 2014: 842 (2014) - 2013
- [c5]Shashank Agrawal, Manoj Prabhakaran:
On Fair Exchange, Fair Coins and Fair Sampling. CRYPTO (1) 2013: 259-276 - [i7]Shashank Agrawal, Manoj Prabhakaran:
On Fair Exchange, Fair Coins and Fair Sampling. IACR Cryptol. ePrint Arch. 2013: 442 (2013) - [i6]Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, Amit Sahai:
Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results. IACR Cryptol. ePrint Arch. 2013: 744 (2013) - [i5]Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran, Alon Rosen:
Lower Bounds in the Hardware Token Model. IACR Cryptol. ePrint Arch. 2013: 827 (2013)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-12-09 23:19 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint