Seguir
Shweta Agrawal
Shweta Agrawal
Dirección de correo verificada de iitm.ac.in - Página principal
Título
Citado por
Citado por
Año
Efficient lattice (H) IBE in the standard model
S Agrawal, D Boneh, X Boyen
Advances in Cryptology–EUROCRYPT 2010: 29th Annual International Conference …, 2010
11652010
Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE
S Agrawal, D Boneh, X Boyen
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
5002010
Homomorphic MACs: MAC-based integrity for network coding
S Agrawal, D Boneh
Applied Cryptography and Network Security: 7th International Conference …, 2009
3602009
Fully secure functional encryption for inner products, from standard assumptions
S Agrawal, B Libert, D Stehlé
Annual International Cryptology Conference, 333-362, 2016
2952016
Functional encryption for inner product predicates from learning with errors
S Agrawal, DM Freeman, V Vaikuntanathan
Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011
2832011
Functional encryption: New perspectives and lower bounds
S Agrawal, S Gorbunov, V Vaikuntanathan, H Wee
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
1942013
Functional encryption for threshold functions (or fuzzy IBE) from lattices
S Agrawal, X Boyen, V Vaikuntanathan, P Voulgaris, H Wee
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
1672012
Optimal broadcast encryption from pairings and LWE
S Agrawal, S Yamada
Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020
682020
Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation
S Agrawal
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
662019
Preventing pollution attacks in multi-source network coding
S Agrawal, D Boneh, X Boyen, DM Freeman
Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010
632010
Secrecy using compressive sensing
S Agrawal, S Vishwanath
2011 IEEE Information Theory Workshop, 563-567, 2011
602011
Stronger security for reusable garbled circuits, general definitions and attacks
S Agrawal
Annual international cryptology conference, 3-35, 2017
592017
Privacy and security of Aadhaar: a computer science perspective
S Agrawal, S Banerjee, S Sharma
Economic and Political Weekly, 93-102, 2017
562017
Functional encryption and property preserving encryption: New definitions and positive results
S Agrawal, S Agrawal, S Badrinarayanan, A Kumarasubramanian, ...
Cryptology ePrint Archive, 2013
552013
Discrete gaussian leftover hash lemma over infinite domains
S Agrawal, C Gentry, S Halevi, A Sahai
International Conference on the Theory and Application of Cryptology and …, 2013
542013
Adaptive protocols for interactive communication
S Agrawal, R Gelles, A Sahai
2016 IEEE International Symposium on Information Theory (ISIT), 595-599, 2016
472016
Adaptive simulation security for inner product functional encryption
S Agrawal, B Libert, M Maitra, R Titiu
IACR International Conference on Public-Key Cryptography, 34-64, 2020
462020
Functional encryption for bounded collusions, revisited
S Agrawal, A Rosen
Theory of Cryptography Conference, 173-205, 2017
462017
Efficient public trace and revoke from standard assumptions
S Agrawal, S Bhattacherjee, DH Phan, D Stehlé, S Yamada
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
462017
On continual leakage of discrete log representations
S Agrawal, Y Dodis, V Vaikuntanathan, D Wichs
International Conference on the Theory and Application of Cryptology and …, 2013
452013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20