Följ
Pratyay Mukherjee
Pratyay Mukherjee
Supra Research
Verifierad e-postadress på supraoracles.com - Startsida
Titel
Citeras av
Citeras av
År
Two round multiparty computation via multi-key FHE
P Mukherjee, D Wichs
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
3942016
Secure obfuscation in a weak multilinear map model
S Garg, E Miles, P Mukherjee, A Sahai, A Srinivasan, M Zhandry
Theory of Cryptography Conference, 241-268, 2016
123*2016
Continuous non-malleable codes
S Faust, P Mukherjee, JB Nielsen, D Venturi
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014 …, 2014
1202014
Efficient non-malleable codes and key derivation for poly-size tampering circuits
S Faust, P Mukherjee, D Venturi, D Wichs
IEEE Transactions on Information Theory 62 (12), 7179-7194, 2016
1182016
The exact round complexity of secure computation
S Garg, P Mukherjee, O Pandey, A Polychroniadou
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
912016
PASTA: password-based threshold authentication
S Agrawal, P Miao, P Mohassel, P Mukherjee
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
662018
Cryptanalysis of indistinguishability obfuscations of circuits over GGH13
D Apon, N Döttling, S Garg, P Mukherjee
Cryptology ePrint Archive, 2016
562016
Bounded tamper resilience: How to go beyond the algebraic barrier
I Damgård, S Faust, P Mukherjee, D Venturi
Journal of Cryptology 30 (1), 152-190, 2017
542017
Block-wise non-malleable codes
N Chandran, V Goyal, P Mukherjee, O Pandey, J Upadhyay
Cryptology ePrint Archive, 2015
542015
Approximate trapdoors for lattices and smaller hash-and-sign signatures
Y Chen, N Genise, P Mukherjee
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
532019
A Tamper and Leakage Resilient von Neumann Architecture
S Faust, P Mukherjee, JB Nielsen, D Venturi
IACR Cryptology ePrint Archive, 2014: 338, 2014
44*2014
DiSE: distributed symmetric-key encryption
S Agrawal, P Mohassel, P Mukherjee, P Rindal
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
422018
Non-malleable codes for space-bounded tampering
S Faust, K Hostáková, P Mukherjee, D Venturi
Annual International Cryptology Conference, 95-126, 2017
352017
A more complete analysis of the signal double ratchet algorithm
A Bienstock, J Fairoze, S Garg, P Mukherjee, S Raghuraman
Annual International Cryptology Conference, 784-813, 2022
272022
Obfuscation from low noise multilinear maps
N Döttling, S Garg, D Gupta, P Miao, P Mukherjee
International Conference on Cryptology in India, 329-352, 2018
262018
The chaining lemma and its application
I Damgård, S Faust, P Mukherjee, D Venturi
International Conference on Information Theoretic Security, 181-196, 2015
21*2015
Reusable two-round MPC from DDH
J Bartusek, S Garg, D Masny, P Mukherjee
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020
172020
Amortized threshold symmetric-key encryption
M Christodorescu, S Gaddam, P Mukherjee, R Sinha
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
122021
Adaptive attack resistant distributed symmetric encryption
P Mukherjee
US Patent 11,431,487, 2022
112022
Leveraging multiple devices to enhance security of biometric authentication
S Agrawal, S Badrinarayanan, P Mohassel, P Mukherjee
US Patent 11,411,738, 2022
112022
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20