Karn Seth

According to our database1, Karn Seth authored at least 21 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Malicious Security for Sparse Private Histograms.
IACR Cryptol. ePrint Arch., 2024

2023
Anonymous Counting Tokens.
IACR Cryptol. ePrint Arch., 2023

2022
Communication Efficient Secure Logistic Regression.
IACR Cryptol. ePrint Arch., 2022

2021
Secure Poisson Regression.
IACR Cryptol. ePrint Arch., 2021

2020
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality.
IACR Cryptol. ePrint Arch., 2020

Private Join and Compute from PIR with Default.
IACR Cryptol. ePrint Arch., 2020

On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

2019
On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications.
IACR Cryptol. ePrint Arch., 2019

Communication-Computation Trade-offs in PIR.
IACR Cryptol. ePrint Arch., 2019

2017
Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions.
IACR Cryptol. ePrint Arch., 2017

Practical Secure Aggregation for Privacy Preserving Machine Learning.
IACR Cryptol. ePrint Arch., 2017

On the Impossibility of Cryptography with Tamperable Randomness.
Algorithmica, 2017

2016
Non-Black Box Use of Code in Cryptography.
PhD thesis, 2016

Indistinguishability Obfuscation with Non-trivial Efficiency.
IACR Cryptol. ePrint Arch., 2016

Practical Secure Aggregation for Federated Learning on User-Held Data.
CoRR, 2016

2015
Output-Compressing Randomized Encodings and Applications.
IACR Cryptol. ePrint Arch., 2015

2014
On the Impossibility of Black-Box Transformations in Mechanism Design.
Proceedings of the Algorithmic Game Theory - 7th International Symposium, 2014

Indistinguishability Obfuscation from Semantically-Secure Multilinear Encodings.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Obfuscation from Semantically-Secure Multi-linear Encodings.
IACR Cryptol. ePrint Arch., 2013

Non-Black-Box Simulation from One-Way Functions And Applications to Resettable Security.
IACR Cryptol. ePrint Arch., 2013

On the (Im)Possibility of Tamper-Resilient Cryptography: Using Fourier Analysis in Computer Viruses.
IACR Cryptol. ePrint Arch., 2013


  Loading...