# Hemanta K. Maji

Orcid: 0000-0003-4244-8658
According to our database

Collaborative distances:

^{1}, Hemanta K. Maji authored at least 75 papers between 2003 and 2024.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Dataset Other## Links

#### On csauthors.net:

## Bibliography

2024

IACR Cryptol. ePrint Arch., 2024

CoRR, 2024

Constructing Leakage-Resilient Shamir's Secret Sharing: Over Composite Order Fields.

Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

2023

Proceedings of the Theory of Cryptography - 21st International Conference, 2023

2022

Proc. Priv. Enhancing Technol., 2022

IACR Cryptol. ePrint Arch., 2022

Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family.

Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Proceedings of the IEEE International Symposium on Information Theory, 2022

Proceedings of the 63rd IEEE Annual Symposium on Foundations of Computer Science, 2022

Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme & Its Consequences.

Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

2021

IACR Cryptol. ePrint Arch., 2021

Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages.

IACR Cryptol. ePrint Arch., 2021

Decidability of Secure Non-interactive Simulation of Doubly Symmetric Binary Source.

IACR Cryptol. ePrint Arch., 2021

Entropy, 2021

Proceedings of the IEEE International Symposium on Information Theory, 2021

Proceedings of the IEEE International Symposium on Information Theory, 2021

Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks.

Proceedings of the IEEE International Symposium on Information Theory, 2021

Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021

2020

IACR Cryptol. ePrint Arch., 2020

IACR Cryptol. ePrint Arch., 2020

IACR Cryptol. ePrint Arch., 2020

IACR Cryptol. ePrint Arch., 2020

IACR Cryptol. ePrint Arch., 2020

IACR Cryptol. ePrint Arch., 2020

Proceedings of the SIAM Workshop on Combinatorial Scientific Computing, 2020

2019

Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness.

IACR Cryptol. ePrint Arch., 2019

Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018

Secure Computation with Constant Communication Overhead using Multiplication Embeddings.

IACR Cryptol. ePrint Arch., 2018

Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions).

IACR Cryptol. ePrint Arch., 2018

Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018

2017

IACR Cryptol. ePrint Arch., 2017

Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016

IACR Cryptol. ePrint Arch., 2016

IACR Cryptol. ePrint Arch., 2016

Proceedings of the IEEE 57th Annual Symposium on Foundations of Computer Science, 2016

On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols.

Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015

IACR Cryptol. ePrint Arch., 2015

IACR Cryptol. ePrint Arch., 2015

A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations.

Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014

A Full Characterization of Completeness for Two-party Randomized Function Evaluation.

IACR Cryptol. ePrint Arch., 2014

IACR Cryptol. ePrint Arch., 2014

Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero.

IACR Cryptol. ePrint Arch., 2014

Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering and Permutations.

IACR Cryptol. ePrint Arch., 2014

IACR Cryptol. ePrint Arch., 2014

Electron. Colloquium Comput. Complex., 2014

Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

2013

Proceedings of the Secure Multi-Party Computation, 2013

IACR Cryptol. ePrint Arch., 2013

Electron. Colloquium Comput. Complex., 2013

2012

Electron. Colloquium Comput. Complex., 2012

A Unified Characterization of Completeness and Triviality for Secure Function Evaluation.

Proceedings of the Progress in Cryptology, 2012

2011

PhD thesis, 2011

IACR Cryptol. ePrint Arch., 2011

Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011

2010

IACR Cryptol. ePrint Arch., 2010

IACR Cryptol. ePrint Arch., 2010

Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010

A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security.

Proceedings of the Advances in Cryptology, 2010

2009

Electron. Colloquium Comput. Complex., 2009

Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation.

Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

2008

Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation.

IACR Cryptol. ePrint Arch., 2008

IACR Cryptol. ePrint Arch., 2008

2006

Proceedings of the EACL 2006, 2006

2005

Theory of Alignment Generators and Applications to Statistical Machine Translation.

Proceedings of the IJCAI-05, Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence, Edinburgh, Scotland, UK, July 30, 2005

A New Decoding Algorithm for Statistical Machine Translation: Design and Implementation.

Proceedings of the Seventh Workshop on Algorithm Engineering and Experiments and the Second Workshop on Analytic Algorithmics and Combinatorics, 2005

2004

An Algorithmic Framework for Solving the Decoding Problem in Statistical Machine Translation.

Proceedings of the COLING 2004, 2004

2003

Generic System to Evolve Memory and Recall Based Fuzzy Controllers for Anytime Learning.

Proceedings of the 1st Indian International Conference on Artificial Intelligence, 2003