Chethan Kamath
Orcid: 0009-0006-6812-7317
According to our database1,
Chethan Kamath
authored at least 28 papers
between 2012 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
2024
Proceedings of the 56th Annual ACM Symposium on Theory of Computing, 2024
2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Keep the Dirt: Tainted TreeKEM, Adaptively and Actively Secure Continuous Group Key Agreement.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Keep the Dirt: Tainted TreeKEM, an Efficient and Provably Secure Continuous Group Key Agreement Protocol.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing, 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
2016
Algorithmica, 2016
Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
2013
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2013
2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012