Akshay Wadia

According to our database1, Akshay Wadia authored at least 12 papers between 2003 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
A counterexample to the chain rule for conditional HILL entropy.
Comput. Complex., 2016

2014
Secure Computation from Hardware Assumptions.
PhD thesis, 2014

Privacy preserving protocol for detecting genetic relatives using rare variants.
Bioinform., 2014

Private interactive communication across an adversarial channel.
Proceedings of the Innovations in Theoretical Computer Science, 2014

Secure Computation Using Leaky Tokens.
Proceedings of the Automata, Languages, and Programming - 41st International Colloquium, 2014

2013
A Counterexample to the Chain Rule for Conditional HILL Entropy - And What Deniable Encryption Has to Do with It.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Cryptography Using Captcha Puzzles.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions.
Proceedings of the Advances in Cryptology, 2013

2012
Resettable Statistical Zero Knowledge.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

2010
Founding Cryptography on Tamper-Proof Hardware Tokens.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

2003
Handling Partially-Achieved Goals in Planning.
Proceedings of the 1st Indian International Conference on Artificial Intelligence, 2003


  Loading...