Eshan Chattopadhyay

Orcid: 0000-0001-9140-3160

Affiliations:
  • Cornell University, Ithaca, NY, USA
  • Institute for Advanced Study, Princeton, School of Mathematics (former)
  • University of California, Berkeley, Simons Institute (former)
  • University of Texas at Austin, Department of Computer Science (former)


According to our database1, Eshan Chattopadhyay authored at least 45 papers between 2012 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Lower Bounds for Leader Election and Collective Coin Flipping, Revisited.
CoRR, April, 2025

Leakage-Resilient Extractors against Number-on-Forehead Protocols.
Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025

2024
Condensing against Online Adversaries.
Electron. Colloquium Comput. Complex., 2024

Two-Sided Lossless Expanders in the Unbalanced Setting.
Electron. Colloquium Comput. Complex., 2024

Recursive Error Reduction for Regular Branching Programs.
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024

Extractors for Polynomial Sources over 𝔽<sub>2</sub>.
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024

On the Existence of Seedless Condensers: Exploring the Terrain.
Proceedings of the 65th IEEE Annual Symposium on Foundations of Computer Science, 2024

2023
Extractors for Polynomial Sources over $\mathbb{F}_2$.
Electron. Colloquium Comput. Complex., 2023

Hardness Against Linear Branching Programs and More.
Proceedings of the 38th Computational Complexity Conference, 2023

2022
Recent Advances in Randomness Extraction.
Entropy, 2022

Extractors for sum of two sources.
Proceedings of the STOC '22: 54th Annual ACM SIGACT Symposium on Theory of Computing, Rome, Italy, June 20, 2022

The Space Complexity of Sampling.
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022

Low-Degree Polynomials Extract From Local Sources.
Proceedings of the 49th International Colloquium on Automata, Languages, and Programming, 2022

2021
Affine Extractors for Almost Logarithmic Entropy.
Proceedings of the 62nd IEEE Annual Symposium on Foundations of Computer Science, 2021

Improved Extractors for Small-Space Sources.
Proceedings of the 62nd IEEE Annual Symposium on Foundations of Computer Science, 2021

Fractional Pseudorandom Generators from Any Fourier Level.
Proceedings of the 36th Computational Complexity Conference, 2021

2020
Guest Column: A Recipe for Constructing Two-Source Extractors.
SIGACT News, 2020

Nonmalleable Extractors and Codes, with Their Many Tampered Extensions.
SIAM J. Comput., 2020

Fractional Pseudorandom Generators from the $k$th Fourier Level.
Electron. Colloquium Comput. Complex., 2020

Leakage-Resilient Extractors and Secret-Sharing against Bounded Collusion Protocols.
Electron. Colloquium Comput. Complex., 2020

Explicit Extremal Designs and Applications to Extractors.
Electron. Colloquium Comput. Complex., 2020

Non-malleable Codes, Extractors and Secret Sharing for Interleaved Tampering and Composition of Tampering.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

XOR lemmas for resilient functions against polynomials.
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, 2020

Extractors for adversarial sources via extremal hypergraphs.
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, 2020

Extractors and Secret Sharing Against Bounded Collusion Protocols.
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020

Non-malleability Against Polynomial Tampering.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Optimal Error Pseudodistributions for Read-Once Branching Programs.
Proceedings of the 35th Computational Complexity Conference, 2020

2019
Pseudorandom Generators from the Second Fourier Level and Applications to AC0 with Parity Gates.
Proceedings of the 10th Innovations in Theoretical Computer Science Conference, 2019

Privacy Amplification from Non-malleable Codes.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

Simple and Efficient Pseudorandom Generators from Gaussian Processes.
Proceedings of the 34th Computational Complexity Conference, 2019

2018
Non-Malleable Extractors and Codes for Composition of Tampering, Interleaved Tampering and More.
IACR Cryptol. ePrint Arch., 2018

Non-Malleable Extractors and Codes in the Interleaved Split-State Model and More.
Electron. Colloquium Comput. Complex., 2018

Improved pseudorandomness for unordered branching programs through local monotonicity.
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, 2018

Pseudorandom Generators from Polarizing Random Walks.
Proceedings of the 33rd Computational Complexity Conference, 2018

A New Approach for Constructing Low-Error, Two-Source Extractors.
Proceedings of the 33rd Computational Complexity Conference, 2018

2017
A reduction from efficient non-malleable extractors to low-error two-source extractors with arbitrary constant rate.
Electron. Colloquium Comput. Complex., 2017

Non-malleable codes and extractors for small-depth circuits, and affine functions.
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, 2017

2016
Explicit two-source extractors and resilient functions.
Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, 2016

Extractors for sumset sources.
Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, 2016

Non-malleable extractors and codes, with their many tampered extensions.
Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, 2016

Explicit Non-malleable Extractors, Multi-source Extractors, and Almost Optimal Privacy Amplification Protocols.
Proceedings of the IEEE 57th Annual Symposium on Foundations of Computer Science, 2016

New Extractors for Interleaved Sources.
Proceedings of the 31st Conference on Computational Complexity, 2016

2014
On Low Discrepancy Samplings in Product Spaces of Motion Groups.
CoRR, 2014

Non-malleable Codes against Constant Split-State Tampering.
Proceedings of the 55th IEEE Annual Symposium on Foundations of Computer Science, 2014

2012
An Explicit VC-Theorem for Low-Degree Polynomials.
Proceedings of the Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, 2012


  Loading...