Bhavana Kanukurthi

Orcid: 0000-0001-7519-4477

According to our database1, Bhavana Kanukurthi authored at least 19 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Secure Vickrey Auctions with Rational Parties.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2022
Rate one-third non-malleable codes.
Proceedings of the STOC '22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20, 2022

Short Leakage Resilient and Non-malleable Secret Sharing Schemes.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Secure Auctions in the Presence of Rational Adversaries.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Simplicity Meets Near-Optimal Rate: Non-malleable Codes and Non-malleable Two-source Extractors via Rate Boosters.
Electron. Colloquium Comput. Complex., 2021

Adaptive Extractors and Their Application to Leakage Resilient Secret Sharing.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Locally Reconstructable Non-Malleable Secret Sharing.
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021

2020
Constant Rate (Non-malleable) Secret Sharing Schemes Tolerating Joint Adaptive Leakage.
IACR Cryptol. ePrint Arch., 2020

2019
Privacy Amplification from Non-malleable Codes.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

2018
Non-malleable Randomness Encoders and Their Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

2017
Four-State Non-malleable Codes with Explicit Constant Rate.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

2016
Information-Theoretic Local Non-malleable Codes and Their Applications.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

2014
Locally Updatable and Locally Decodable Codes.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Achieving Privacy in Verifiable Computation with Multiple Servers - Without FHE and without Pre-processing.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

2011
Cryptography with Tamperable and Leaky Memory.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2010
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets.
IACR Cryptol. ePrint Arch., 2010

Privacy amplification with asymptotically optimal entropy loss.
Proceedings of the 42nd ACM Symposium on Theory of Computing, 2010

2009
Key Agreement from Close Secrets over Unsecured Channels.
Proceedings of the Advances in Cryptology, 2009

2008
An Improved Robust Fuzzy Extractor.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008


  Loading...