Mayank Varia

According to our database1, Mayank Varia authored at least 47 papers between 2008 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Secret Sharing MPC on FPGAs in the Datacenter.
CoRR, 2020

Anonymous Collocation Discovery: Taming the Coronavirus While Preserving Privacy.
CoRR, 2020

2019
Privacy With Estimation Guarantees.
IEEE Trans. Inf. Theory, 2019

From Usability to Secure Computing and Back Again.
IACR Cryptol. ePrint Arch., 2019

EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security.
IACR Cryptol. ePrint Arch., 2019

Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies.
CoRR, 2019

Conclave: secure multi-party computation on big data (extended TR).
CoRR, 2019

Role-Based Ecosystem for the Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications.
Proceedings of the 2019 IEEE Cybersecurity Development, 2019

Conclave: secure multi-party computation on big data.
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019

2018
An Analysis of Acceptance Policies For Blockchain Transactions.
IACR Cryptol. ePrint Arch., 2018

On the Universally Composable Security of OpenStack.
IACR Cryptol. ePrint Arch., 2018

A Cryptographic Airbag for Metadata: Protecting Business Records Against Unlimited Search and Seizure.
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018

Crypto Crumple Zones: Enabling Limited Access without Mass Surveillance.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

Accessible Privacy-Preserving Web-Based Data Analysis for Assessing and Addressing Economic Inequalities.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

2017
Principal Inertia Components and Applications.
IEEE Trans. Inf. Theory, 2017

Role-Based Ecosystem Model for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications.
IACR Cryptol. ePrint Arch., 2017

Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions.
IACR Cryptol. ePrint Arch., 2017

A Universally Composable Treatment of Network Time.
IACR Cryptol. ePrint Arch., 2017

User-centric distributed solutions for privacy-preserving analytics.
Commun. ACM, 2017

Brief Announcement: Federated Code Auditing and Delivery for MPC.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017

SoK: Cryptographically Protected Database Search.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Revealing the Unseen: How to Expose Cloud Usage While Protecting User Privacy.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

2016
DEMO: Integrating MPC in Big Data Workflows.
IACR Cryptol. ePrint Arch., 2016

Evolving S-Boxes with Reduced Differential Power Analysis Susceptibility.
IACR Cryptol. ePrint Arch., 2016

The Security of NTP's Datagram Protocol.
IACR Cryptol. ePrint Arch., 2016

Cryptography for Big Data Security.
IACR Cryptol. ePrint Arch., 2016

Secure MPC for Analytics as a Web Application.
Proceedings of the IEEE Cybersecurity Development, 2016

Diversity Within the Rijndael Design Principles for Resistance to Differential Power Analysis.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

Moving in Next Door: Network Flooding as a Side Channel in Cloud Environments.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Automated Assessment of Secure Search Systems.
Operating Systems Review, 2015

HETest: A Homomorphic Encryption Testing Framework.
IACR Cryptol. ePrint Arch., 2015

Computing on Masked Data to improve the Security of Big Data.
CoRR, 2015

Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security.
CoRR, 2015

Cryptographically Secure Computation.
IEEE Computer, 2015

Parallel vectorized algebraic AES in Matlab for rapid prototyping of encrypted sensor processing algorithms and database analytics.
Proceedings of the 2015 IEEE High Performance Extreme Computing Conference, 2015

2014
An exploration of the role of principal inertia components in information theory.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Computing on masked data: a high performance method for improving big data veracity.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2014

On information-theoretic metrics for symmetric-key encryption and privacy.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

2013
The Probabilistic Provenance Graph.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Achieving Linguistic Provenance via Plagiarism Detection.
Proceedings of the 12th International Conference on Document Analysis and Recognition, 2013

Bounds on inference.
Proceedings of the 51st Annual Allerton Conference on Communication, 2013

2011
Decisional Diffie-Hellman Problem.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
On Symmetric Encryption and Point Obfuscation.
IACR Cryptol. ePrint Arch., 2010

Obfuscation of Hyperplane Membership.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

2008
Non-Malleable Obfuscation.
IACR Cryptol. ePrint Arch., 2008


  Loading...