Hemanta K. Maji
Orcid: 0000-0003-4244-8658
According to our database1,
Hemanta K. Maji
authored at least 77 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Proceedings of the 23rd International Symposium on Experimental Algorithms, 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
Proceedings of the 6th Conference on Information-Theoretic Cryptography, 2025
2024
Proceedings of the IEEE International Symposium on Information Theory, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
2022
Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the IEEE International Symposium on Information Theory, 2022
Proceedings of the 63rd IEEE Annual Symposium on Foundations of Computer Science, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme & Its Consequences.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the SIAM Workshop on Combinatorial Scientific Computing, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Secure Computation with Constant Communication Overhead Using Multiplication Embeddings.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Proceedings of the IEEE 57th Annual Symposium on Foundations of Computer Science, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering and Permutations.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Electron. Colloquium Comput. Complex., 2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the Innovations in Theoretical Computer Science, 2014
A Full Characterization of Completeness for Two-Party Randomized Function Evaluation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Proceedings of the Secure Multi-Party Computation, 2013
IACR Cryptol. ePrint Arch., 2013
2012
A Unified Characterization of Completeness and Triviality for Secure Function Evaluation.
Proceedings of the Progress in Cryptology, 2012
2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Innovations in Computer Science, 2010
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010
A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security.
Proceedings of the Advances in Cryptology, 2010
2009
Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
2008
Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
2006
Proceedings of the EACL 2006, 2006
2005
Proceedings of the IJCAI-05, Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence, Edinburgh, Scotland, UK, July 30, 2005
A New Decoding Algorithm for Statistical Machine Translation: Design and Implementation.
Proceedings of the Seventh Workshop on Algorithm Engineering and Experiments and the Second Workshop on Analytic Algorithmics and Combinatorics, 2005
2004
An Algorithmic Framework for Solving the Decoding Problem in Statistical Machine Translation.
Proceedings of the COLING 2004, 2004
2003
Generic System to Evolve Memory and Recall Based Fuzzy Controllers for Anytime Learning.
Proceedings of the 1st Indian International Conference on Artificial Intelligence, 2003