Dhinakaran Vinayagamurthy

Orcid: 0000-0001-9388-7154

According to our database1, Dhinakaran Vinayagamurthy authored at least 26 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimized QAOA ansatz circuit design for two-body Hamiltonian problems.
Proceedings of the 37th International Conference on VLSI Design and 23rd International Conference on Embedded Systems, 2024

2023
Accelerated Verifiable Fair Digital Exchange.
Distributed Ledger Technol. Res. Pract., September, 2023

2022
How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols.
Proc. Priv. Enhancing Technol., 2022

Private Certifier Intersection.
IACR Cryptol. ePrint Arch., 2022

Classical ensemble of Quantum-classical ML algorithms for Phishing detection in Ethereum transaction networks.
CoRR, 2022

Efficient Machine-Learning-based decoder for Heavy Hexagonal QECC.
CoRR, 2022

Generalized HTLC for Cross-Chain Swapping of Multiple Assets with Co-Ownerships.
CoRR, 2022

Privacy-Preserving Decentralized Exchange Marketplaces.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

Privacy-Preserving Negotiation of Common Trust Anchors Across Blockchain Networks.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

Atomic cross-chain exchanges of shared assets.
Proceedings of the 4th ACM Conference on Advances in Financial Technologies, 2022

2021
Depth Optimized Ansatz Circuit in QAOA for Max-Cut.
CoRR, 2021

Optimizing Ansatz Design in QAOA for Max-cut.
CoRR, 2021

Trusted Data Notifications from Private Blockchains.
CoRR, 2021

2020
Trusted Data Notifications from Private Blockchains<sup>#</sup>.
Proceedings of the IEEE International Conference on Blockchain, 2020

2019
StealthDB: a Scalable Encrypted Database with Full SQL Query Support.
Proc. Priv. Enhancing Technol., 2019

2018
User-Controlled Computations in Untrusted Computing Environments.
PhD thesis, 2018

2017
IRON: Functional Encryption using Intel SGX.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Functional Encryption from Secure Enclaves.
IACR Cryptol. ePrint Arch., 2016

Reducing Depth in Constrained PRFs: From Bit-Fixing to \mathbf NC^1.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

2015
Reducing Multilinear Map Levels in Constrained PRFs and ABE.
IACR Cryptol. ePrint Arch., 2015

2014
Riding on Asymmetry: Efficient ABE for Branching Programs.
IACR Cryptol. ePrint Arch., 2014

Constrained Pseudorandom Functions: Verifiable and Delegatable.
IACR Cryptol. ePrint Arch., 2014

Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits.
IACR Cryptol. ePrint Arch., 2014

2013
How to Compress (Reusable) Garbled Circuits.
IACR Cryptol. ePrint Arch., 2013

2012
ID Based Signcryption Scheme in Standard Model.
IACR Cryptol. ePrint Arch., 2012

2011
On the Security of ID Based Signcryption Schemes.
IACR Cryptol. ePrint Arch., 2011


  Loading...