Mahimna Kelkar

Orcid: 0009-0007-4268-4681

According to our database1, Mahimna Kelkar authored at least 32 papers between 2018 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Voting-Bloc Entropy: A New Metric for DAO Decentralization.
Proceedings of the 34th USENIX Security Symposium, 2025

Liquefaction: Privately Liquefying Blockchain Assets.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Breaking Omertà: On Threshold Cryptography, Smart Collusion, and Whistleblowing.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
The Sting Framework: Proving the Existence of Superclass Adversaries.
IACR Cryptol. ePrint Arch., 2024

PROF: Protected Order Flow in a Profit-Seeking World.
IACR Cryptol. ePrint Arch., 2024

GoAT: File Geolocation via Anchor Timestamping.
Proceedings of the Financial Cryptography and Data Security, 2024

Truncator: Time-Space Tradeoff of Cryptographic Primitives.
Proceedings of the Financial Cryptography and Data Security, 2024

Compressing Unit-Vector Correlations via Sparse Pseudorandom Generators.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Information-Theoretic Single-Server PIR in the Shuffle Model.
Proceedings of the 5th Conference on Information-Theoretic Cryptography, 2024

Atomic and Fair Data Exchange via Blockchain.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Interactive Multi-Credential Authentication.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Complete Knowledge: Preventing Encumbrance of Cryptographic Secrets.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Computationally Secure Aggregation and Private Information Retrieval in the Shuffle Model.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Secure Sorting and Selection via Function Secret Sharing.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

BoLD: Fast and Cheap Dispute Resolution.
Proceedings of the 6th Conference on Advances in Financial Technologies, 2024

2023
DAO Decentralization: Voting-Bloc Entropy, Bribery, and Dark DAOs.
CoRR, 2023

Buying Time: Latency Racing vs. Bidding in Fair Transaction Ordering.
CoRR, 2023

Zef: Low-latency, Scalable, Private Payments.
Proceedings of the 22nd Workshop on Privacy in the Electronic Society, 2023

Clockwork Finance: Automated Analysis of Economic Security in Smart Contracts.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

One-Message Secure Reductions: On the Cost of Converting Correlations.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Themis: Fast, Strong Order-Fairness in Byzantine Consensus.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Lanturn: Measuring Economic Security of Smart Contracts Through Adaptive Learning.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Buying Time: Latency Racing vs. Bidding for Transaction Ordering.
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023

STROBE: Streaming Threshold Random Beacons.
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023

2022
Interactive Authentication.
IACR Cryptol. ePrint Arch., 2022

Secure Poisson Regression.
Proceedings of the 31st USENIX Security Symposium, 2022

Order-Fair Consensus in the Permissionless Setting.
Proceedings of the APKC '22: Proceedings of the 9th ACM on ASIA Public-Key Cryptography Workshop, 2022

2021
STROBE: Stake-based Threshold Random Beacons.
IACR Cryptol. ePrint Arch., 2021

MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Order-Fairness for Byzantine Consensus.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Flexible Signatures: Making Authentication Suitable for Real-Time Environments.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments.
IACR Cryptol. ePrint Arch., 2018


  Loading...