Ananth Raghunathan

According to our database1, Ananth Raghunathan authored at least 18 papers between 2009 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Oblivious Revocable Functions and Encrypted Indexing.
IACR Cryptol. ePrint Arch., 2022

2020
Encode, Shuffle, Analyze Privacy Revisited: Formalizations and Empirical Evaluation.
CoRR, 2020

Information Leakage in Embedding Models.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
That which we call private.
CoRR, 2019

Protecting accounts from credential stuffing with password breach alerting.
Proceedings of the 28th USENIX Security Symposium, 2019

Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity.
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, 2019

2018
Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions.
J. Cryptol., 2018

Scalable Private Learning with PATE.
Proceedings of the 6th International Conference on Learning Representations, 2018

2017
Prochlo: Strong Privacy for Analytics in the Crowd.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

2016
Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE.
IACR Cryptol. ePrint Arch., 2016

2015
Key Homomorphic PRFs and Their Applications.
IACR Cryptol. ePrint Arch., 2015

Message-Locked Encryption for Lock-Dependent Messages.
IACR Cryptol. ePrint Arch., 2015

2014
Private functional encryption and secure deduplication.
PhD thesis, 2014

Improved Constructions of PRFs Secure Against Related-Key Attacks.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Function-Private Subspace-Membership Encryption and Its Applications.
IACR Cryptol. ePrint Arch., 2013

Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption.
IACR Cryptol. ePrint Arch., 2013

2010
Algebraic Pseudorandom Functions with Improved Efficiency from the Augmented Cascade.
IACR Cryptol. ePrint Arch., 2010

2009
Obfuscating straight line arithmetic programs.
Proceedings of the 9th ACM Workshop on Digital Rights Management, 2009


  Loading...