Debajyoti Das

Orcid: 0000-0002-6777-0566

Affiliations:
  • KU Leuven, Belgium
  • Purdue University, USA (former)


According to our database1, Debajyoti Das authored at least 14 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Kerblam - Anonymous Messaging System Protecting Both Senders and Recipients.
IACR Cryptol. ePrint Arch., 2025

sPAR: (Somewhat) Practical Anonymous Router.
IACR Cryptol. ePrint Arch., 2025

Mixnets on a Tightrope: Quantifying the Leakage of Mix Networks Using a Provably Optimal Heuristic Adversary.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

2024
Blending Different Latency Traffic With Beta Mixing.
Proc. Priv. Enhancing Technol., 2024

Panacea: Non-Interactive and Stateless Oblivious RAM.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

Divide and Funnel: A Scaling Technique for Mix-Networks.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

2023
Are continuous stop-and-go mixnets provably secure?
IACR Cryptol. ePrint Arch., 2023

Poster: Panacea - Stateless and Non-Interactive Oblivious RAM.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
OrgAn: Organizational Anonymity with Low Latency.
IACR Cryptol. ePrint Arch., 2022

SortingHat: Efficient Private Decision Tree Evaluation via Homomorphic Encryption and Transciphering.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
On Elapsed Time Consensus Protocols.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

2020
Comprehensive Anonymity Trilemma: User Coordination is not enough.
Proc. Priv. Enhancing Technol., 2020

2018
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

2017
cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations.
Proceedings of the Applied Cryptography and Network Security, 2017


  Loading...