Hemanta K. Maji

Orcid: 0000-0003-4244-8658

According to our database1, Hemanta K. Maji authored at least 74 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Unconditional Security using (Random) Anonymous Bulletin Board.
IACR Cryptol. ePrint Arch., 2024

GreedyML: A Parallel Algorithm for Maximizing Submodular Functions.
CoRR, 2024

2023
Randomized Functions with High Round Complexity.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

2022
Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications.
Proc. Priv. Enhancing Technol., 2022

SIM: Secure Interval Membership Testing and Applications to Secure Comparison.
IACR Cryptol. ePrint Arch., 2022

Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Secure Non-interactive Simulation from Arbitrary Joint Distributions.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Improved Bound on the Local Leakage-resilience of Shamir's Secret Sharing.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Geometry of Secure Two-party Computation.
Proceedings of the 63rd IEEE Annual Symposium on Foundations of Computer Science, 2022

Secure Non-interactive Simulation: Feasibility and Rate.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme & Its Consequences.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

2021
Computational Hardness of Optimal FairComputation: Beyond Minicrypt.
IACR Cryptol. ePrint Arch., 2021

Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages.
IACR Cryptol. ePrint Arch., 2021

Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source.
IACR Cryptol. ePrint Arch., 2021

Computational Hardness of Collective Coin-Tossing Protocols.
Entropy, 2021

Optimally-secure Coin-tossing against a Byzantine Adversary.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Efficient Distributed Coin-tossing Protocols.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Computational Hardness of Optimal Fair Computation: Beyond Minicrypt.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

P<sub>4</sub>-free Partition and Cover Numbers & Applications.
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021

2020
Black-box use of One-way Functions is Useless for Optimal Fair Coin-Tossing.
IACR Cryptol. ePrint Arch., 2020

On Leakage-Resilient Secret Sharing.
IACR Cryptol. ePrint Arch., 2020

Design & Analysis of Optimal Coin-tossing: New Techniques.
IACR Cryptol. ePrint Arch., 2020

Coin Tossing with Lazy Defense: Hardness of Computation Results.
IACR Cryptol. ePrint Arch., 2020

Secure Non-interactive Simulation: Hardness & Feasibility.
IACR Cryptol. ePrint Arch., 2020

P<sub>4</sub>-free Partition and Cover Numbers.
IACR Cryptol. ePrint Arch., 2020

Graphs with Tunable Chromatic Numbers for Parallel Coloring.
Proceedings of the SIAM Workshop on Combinatorial Scientific Computing, 2020

2019
Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness.
IACR Cryptol. ePrint Arch., 2019

Explicit Rate-1 Non-malleable Codes for Local Tampering.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Secure Computation with Constant Communication Overhead using Multiplication Embeddings.
IACR Cryptol. ePrint Arch., 2018

Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions).
IACR Cryptol. ePrint Arch., 2018

Non-malleable Codes Against Lookahead Tampering.
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

2017
Constant-rate Non-malleable Codes in the Split-state Model.
IACR Cryptol. ePrint Arch., 2017

Characterizing optimal security and round-complexity for secure OR evaluation.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Secure Computation Based on Leaky Correlations: High Resilience Setting.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
All Complete Functionalities are Reversible.
IACR Cryptol. ePrint Arch., 2016

Secure Computation from Elastic Noisy Channels.
IACR Cryptol. ePrint Arch., 2016

Bounded-Communication Leakage Resilience via Parity-Resilient Circuits.
Proceedings of the IEEE 57th Annual Symposium on Foundations of Computer Science, 2016

On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Zeroizing Without Low-Level Zeroes: New MMAP Attacks and Their Limitations.
IACR Cryptol. ePrint Arch., 2015

Optimal Computational Split-state Non-malleable Codes.
IACR Cryptol. ePrint Arch., 2015

A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Secure Computation from Leaky Correlated Randomness.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
A Full Characterization of Completeness for Two-party Randomized Function Evaluation.
IACR Cryptol. ePrint Arch., 2014

Black Box Separations for Differentially Private Protocols.
IACR Cryptol. ePrint Arch., 2014

Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero.
IACR Cryptol. ePrint Arch., 2014

Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering and Permutations.
IACR Cryptol. ePrint Arch., 2014

Explicit Non-malleable Codes Resistant to Permutations and Perturbations.
IACR Cryptol. ePrint Arch., 2014

Explicit Non-Malleable Codes Resistant to Permutations.
Electron. Colloquium Comput. Complex., 2014

Single-use ot combiners with near-optimal resilience.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

2013
Complexity of Multi-Party Computation Functionalities.
Proceedings of the Secure Multi-Party Computation, 2013

Complexity of Multi-Party Computation Functionalities.
IACR Cryptol. ePrint Arch., 2013

On the Power of Public-key Encryption in Secure Computation.
Electron. Colloquium Comput. Complex., 2013

2012
Limits of Random Oracles in Secure Computation.
Electron. Colloquium Comput. Complex., 2012

A Unified Characterization of Completeness and Triviality for Secure Function Evaluation.
Proceedings of the Progress in Cryptology, 2012

2011
On computational intractability assumptions in cryptography
PhD thesis, 2011

Exploring the Limits of Common Coins Using Frontier Analysis of Protocols.
IACR Cryptol. ePrint Arch., 2011

The Limits of Common Coins: Further Results.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Stateless Cryptographic Protocols.
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011

2010
Attribute-Based Signatures.
IACR Cryptol. ePrint Arch., 2010

A Zero-One Law for Deterministic 2-Party Secure Computation.
IACR Cryptol. ePrint Arch., 2010

On the Computational Complexity of Coin Flipping.
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010

A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security.
Proceedings of the Advances in Cryptology, 2010

2009
Cryptographic Complexity Classes and Computational Intractability Assumptions.
Electron. Colloquium Comput. Complex., 2009

Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

2008
Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation.
IACR Cryptol. ePrint Arch., 2008

Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance.
IACR Cryptol. ePrint Arch., 2008

2006
Computational Complexity of Statistical Machine Translation.
Proceedings of the EACL 2006, 2006

2005
Theory of Alignment Generators and Applications to Statistical Machine Translation.
Proceedings of the IJCAI-05, Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence, Edinburgh, Scotland, UK, July 30, 2005

A New Decoding Algorithm for Statistical Machine Translation: Design and Implementation.
Proceedings of the Seventh Workshop on Algorithm Engineering and Experiments and the Second Workshop on Analytic Algorithmics and Combinatorics, 2005

2004
An Algorithmic Framework for Solving the Decoding Problem in Statistical Machine Translation.
Proceedings of the COLING 2004, 2004

2003
Generic System to Evolve Memory and Recall Based Fuzzy Controllers for Anytime Learning.
Proceedings of the 1st Indian International Conference on Artificial Intelligence, 2003


  Loading...