Manoj Prabhakaran
Affiliations:- IIT Bombay, Department of Computer Science, Mumbai, India
- University of Illinois, Urbana-Champaign
According to our database1,
Manoj Prabhakaran
authored at least 105 papers
between 2002 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
On csauthors.net:
Bibliography
2025
2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
Proceedings of the IEEE International Symposium on Information Theory, 2024
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the 5th Conference on Information-Theoretic Cryptography, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
Proceedings of the IEEE International Symposium on Information Theory, 2023
2022
Oblivious-Transfer Complexity of Noisy Coin-Toss via Secure Zero Communication Reductions.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the International Conference on Artificial Intelligence and Statistics, 2022
2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Secure Computation from One-Way Noisy Communication, or: Anti-correlation via Anti-concentration.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021
2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing.
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019
Proceedings of the Information Systems Security - 15th International Conference, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018
Brief Announcement: On Secure m-Party Computation, Commuting Permutation Systems and Unassisted Non-Interactive MPC.
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018
2017
2016
IEEE Trans. Inf. Theory, 2016
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Rényi Information Complexity and an Information Theoretic Characterization of the Partition Bound.
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
2015
Obfuscation-Based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
IEEE Trans. Inf. Theory, 2014
Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering and Permutations.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Electron. Colloquium Comput. Complex., 2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the Symposium on Theory of Computing, 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the Innovations in Theoretical Computer Science, 2014
Proceedings of the Automata, Languages, and Programming - 41st International Colloquium, 2014
A Full Characterization of Completeness for Two-Party Randomized Function Evaluation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the Secure Multi-Party Computation, 2013
IACR Cryptol. ePrint Arch., 2013
Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Automata, Languages, and Programming - 40th International Colloquium, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
2012
Proceedings of the 2012 IEEE Information Theory Workshop, 2012
A Unified Characterization of Completeness and Triviality for Secure Function Evaluation.
Proceedings of the Progress in Cryptology, 2012
New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
2010
ACM Trans. Inf. Syst. Secur., 2010
IACR Cryptol. ePrint Arch., 2010
CoRR, 2010
Proceedings of the IEEE International Symposium on Information Theory, 2010
Proceedings of the Innovations in Computer Science, 2010
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010
A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security.
Proceedings of the Advances in Cryptology, 2010
2009
Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
Proceedings of the Computer Security, 2009
2008
Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations.
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
2007
2006
Proceedings of the Theory of Cryptography, Third Theory of Cryptography Conference, 2006
Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science, 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation.
Proceedings of the Theory of Cryptography, Second Theory of Cryptography Conference, 2005
Proceedings of the 37th Annual ACM Symposium on Theory of Computing, 2005
2004
Proceedings of the 36th Annual ACM Symposium on Theory of Computing, 2004
Proceedings of the 45th Symposium on Foundations of Computer Science, 2004
Proceedings of the Advances in Cryptology, 2004
2002
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Proceedings on 34th Annual ACM Symposium on Theory of Computing, 2002
Proceedings of the 43rd Symposium on Foundations of Computer Science, 2002
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002