Akshay Wadia

According to our database1, Akshay Wadia authored at least 12 papers between 2003 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2017
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions.
IACR Cryptol. ePrint Arch., 2017

2016
A counterexample to the chain rule for conditional HILL entropy.
Comput. Complex., 2016

2015
Private Interactive Communication Across an Adversarial Channel.
IEEE Trans. Inf. Theory, 2015

2014
Secure Computation from Hardware Assumptions.
PhD thesis, 2014

Privacy preserving protocol for detecting genetic relatives using rare variants.
Bioinform., 2014

Secure Computation Using Leaky Tokens.
Proceedings of the Automata, Languages, and Programming - 41st International Colloquium, 2014

2013
A Counterexample to the Chain Rule for Conditional HILL Entropy - And What Deniable Encryption Has to Do with It.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

2012
Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions.
IACR Cryptol. ePrint Arch., 2012

Cryptography Using CAPTCHA Puzzles.
IACR Cryptol. ePrint Arch., 2012

2011
Resettable Statistical Zero Knowledge.
IACR Cryptol. ePrint Arch., 2011

2010
Founding Cryptography on Tamper-Proof Hardware Tokens.
IACR Cryptol. ePrint Arch., 2010

2003
Handling Partially-Achieved Goals in Planning.
Proceedings of the 1st Indian International Conference on Artificial Intelligence, 2003


  Loading...