Mayank Varia

According to our database1, Mayank Varia authored at least 59 papers between 2008 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
From Usability to Secure Computing and Back Again.
IACR Cryptology ePrint Archive, 2019

EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security.
IACR Cryptology ePrint Archive, 2019

Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies.
CoRR, 2019

Conclave: secure multi-party computation on big data (extended TR).
CoRR, 2019

From Usability to Secure Computing and Back Again.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

Conclave: secure multi-party computation on big data.
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019

EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security.
Proceedings of the 32nd IEEE Computer Security Foundations Symposium, 2019

2018
An Analysis of Acceptance Policies For Blockchain Transactions.
IACR Cryptology ePrint Archive, 2018

On the Universally Composable Security of OpenStack.
IACR Cryptology ePrint Archive, 2018

A Cryptographic Airbag for Metadata: Protecting Business Records Against Unlimited Search and Seizure.
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018

Crypto Crumple Zones: Enabling Limited Access without Mass Surveillance.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

Accessible Privacy-Preserving Web-Based Data Analysis for Assessing and Addressing Economic Inequalities.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

2017
Principal Inertia Components and Applications.
IEEE Trans. Information Theory, 2017

Role-Based Ecosystem Model for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications.
IACR Cryptology ePrint Archive, 2017

Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions.
IACR Cryptology ePrint Archive, 2017

A Universally Composable Treatment of Network Time.
IACR Cryptology ePrint Archive, 2017

Revealing the Unseen: How to Expose Cloud Usage While Protecting User Privacy.
CoRR, 2017

SoK: Cryptographically Protected Database Search.
CoRR, 2017

Principal Inertia Components and Applications.
CoRR, 2017

User-centric distributed solutions for privacy-preserving analytics.
Commun. ACM, 2017

Brief Announcement: Federated Code Auditing and Delivery for MPC.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017

SoK: Cryptographically Protected Database Search.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Revealing the Unseen: How to Expose Cloud Usage While Protecting User Privacy.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

The Security of NTP's Datagram Protocol.
Proceedings of the Financial Cryptography and Data Security, 2017

Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

A Universally Composable Treatment of Network Time.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

2016
DEMO: Integrating MPC in Big Data Workflows.
IACR Cryptology ePrint Archive, 2016

Evolving S-Boxes with Reduced Differential Power Analysis Susceptibility.
IACR Cryptology ePrint Archive, 2016

The Security of NTP's Datagram Protocol.
IACR Cryptology ePrint Archive, 2016

Cryptography for Big Data Security.
IACR Cryptology ePrint Archive, 2016

Secure MPC for Analytics as a Web Application.
Proceedings of the IEEE Cybersecurity Development, 2016

DEMO: Integrating MPC in Big Data Workflows.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Diversity Within the Rijndael Design Principles for Resistance to Differential Power Analysis.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

Moving in Next Door: Network Flooding as a Side Channel in Cloud Environments.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Automated Assessment of Secure Search Systems.
Operating Systems Review, 2015

HETest: A Homomorphic Encryption Testing Framework.
IACR Cryptology ePrint Archive, 2015

Parallel Vectorized Algebraic AES in MATLAB for Rapid Prototyping of Encrypted Sensor Processing Algorithms and Database Analytics.
CoRR, 2015

Computing on Masked Data to improve the Security of Big Data.
CoRR, 2015

Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security.
CoRR, 2015

Cryptographically Secure Computation.
IEEE Computer, 2015

Parallel vectorized algebraic AES in Matlab for rapid prototyping of encrypted sensor processing algorithms and database analytics.
Proceedings of the 2015 IEEE High Performance Extreme Computing Conference, 2015

HEtest: A Homomorphic Encryption Testing Framework.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Computing on Masked Data: a High Performance Method for Improving Big Data Veracity.
CoRR, 2014

An Exploration of the Role of Principal Inertia Components in Information Theory.
CoRR, 2014

An exploration of the role of principal inertia components in information theory.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Computing on masked data: a high performance method for improving big data veracity.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2014

On information-theoretic metrics for symmetric-key encryption and privacy.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

2013
Bounds on inference.
CoRR, 2013

The Probabilistic Provenance Graph.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Achieving Linguistic Provenance via Plagiarism Detection.
Proceedings of the 12th International Conference on Document Analysis and Recognition, 2013

Bounds on inference.
Proceedings of the 51st Annual Allerton Conference on Communication, 2013

2011
Decisional Diffie-Hellman Problem.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
On Symmetric Encryption and Point Obfuscation.
IACR Cryptology ePrint Archive, 2010

Obfuscation of Hyperplane Membership.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

On Symmetric Encryption and Point Obfuscation.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

2009
Non-malleable Obfuscation.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009

2008
Non-Malleable Obfuscation.
IACR Cryptology ePrint Archive, 2008


  Loading...