Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Manoj Prabhakaran - MaRDI portal

Manoj Prabhakaran

From MaRDI portal
Person:656918

Available identifiers

zbMath Open prabhakaran.manoj-mMaRDI QIDQ656918

List of research outcomes

PublicationDate of PublicationType
A map of witness maps: new definitions and connections2023-11-16Paper
SCALES. MPC with small clients and larger ephemeral servers2023-08-14Paper
Secure non-interactive reducibility is decidable2023-08-14Paper
Oblivious-transfer complexity of noisy coin-toss via secure zero communication reductions2023-08-14Paper
Group Structure in Correlations and Its Applications in Cryptography.2023-07-03Paper
On communication models and best-achievable security in two-round MPC2023-04-13Paper
Cryptography from one-way communication: on completeness of finite channels2023-03-29Paper
Witness Maps and Applications2022-10-13Paper
COA-secure obfuscation and applications2022-08-30Paper
Secure non-interactive reduction and spectral analysis of correlations2022-08-30Paper
Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration2022-04-22Paper
Zero-communication reductions2022-03-23Paper
https://portal.mardi4nfdi.de/entity/Q50026942021-07-28Paper
Brief announcement: On secure m-party computation, commuting permutation systems and unassisted non-interactive MPC2021-07-28Paper
Optimality of a protocol by Feige-Kilian-Naor for three-party secure computation2020-05-12Paper
Uncovering algebraic structures in the MPC landscape2020-02-06Paper
Towards characterizing securely computable two-party randomized functions2018-05-16Paper
R\'enyi Information Complexity and an Information Theoretic Characterization of the Partition Bound2017-12-19Paper
Reconciling non-malleability with homomorphic encryption2017-10-12Paper
Limits of random oracles in secure computation2017-05-19Paper
Assisted Common Information With an Application to Secure Two-Party Sampling2017-05-16Paper
Communication and Randomness Lower Bounds for Secure Computation2017-04-28Paper
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents2016-12-22Paper
Secure Protocol Transformations2016-10-27Paper
All Complete Functionalities are Reversible2016-07-15Paper
Optimal Computational Split-state Non-malleable Codes2016-04-08Paper
Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations2015-12-10Paper
Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data2015-09-30Paper
On the Practical Security of Inner Product Functional Encryption2015-08-27Paper
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations2015-07-06Paper
Obfuscation-Based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP2015-07-06Paper
Circuits resilient to additive attacks with applications to secure computation2015-06-26Paper
A Unified Characterization of Completeness and Triviality for Secure Function Evaluation2014-08-20Paper
On the Communication Complexity of Secure Computation2014-08-07Paper
Secure Computation Using Leaky Tokens2014-07-01Paper
A Full Characterization of Completeness for Two-Party Randomized Function Evaluation2014-05-27Paper
On the Power of Public-Key Encryption in Secure Computation2014-02-18Paper
Lower Bounds in the Hardware Token Model2014-02-18Paper
On Fair Exchange, Fair Coins and Fair Sampling2013-09-02Paper
Robust Pseudorandom Generators2013-08-06Paper
New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation2012-09-25Paper
Resource fairness and composability of cryptographic protocols2012-01-13Paper
The Limits of Common Coins: Further Results2011-12-16Paper
Constant-Rate Oblivious Transfer from Noisy Channels2011-08-12Paper
Efficient Non-interactive Secure Computation2011-05-27Paper
Exploring the Limits of Common Coins Using Frontier Analysis of Protocols2011-05-19Paper
Attribute-Based Signatures2011-02-11Paper
A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security2010-08-24Paper
Concurrent general composition of secure protocols in the timing model2010-08-16Paper
New notions of security2010-08-15Paper
Approximating the smallest grammar2010-08-05Paper
Statistically Hiding Sets2009-04-29Paper
Rerandomizable RCCA Encryption2009-03-10Paper
Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation2009-03-03Paper
Secure Arithmetic Computation with No Honest Majority2009-03-03Paper
Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations2009-02-10Paper
Founding Cryptography on Oblivious Transfer – Efficiently2009-02-10Paper
Towards Robust Computation on Encrypted Data2009-02-10Paper
The Smallest Grammar Problem2008-12-21Paper
Homomorphic Encryption with CCA Security2008-08-19Paper
Concurrent composition of secure protocols in the timing model2007-12-06Paper
Advances in Cryptology - EUROCRYPT 20042007-09-25Paper
Private Circuits II: Keeping Secrets in Tamperable Circuits2007-09-24Paper
Theory of Cryptography2007-02-12Paper
Theory of Cryptography2005-12-07Paper
https://portal.mardi4nfdi.de/entity/Q48086542004-08-12Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Manoj Prabhakaran