Sarvar Patel
Orcid: 0009-0002-4521-462X
According to our database1,
Sarvar Patel
authored at least 53 papers
between 1995 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the Advances in Neural Information Processing Systems 38: Annual Conference on Neural Information Processing Systems 2024, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume-Hiding Multi-Maps.
Proceedings of the 32nd USENIX Security Symposium, 2023
2021
Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
2019
Leakage Cell Probe Model: Lower Bounds for Key-Equality Mitigation in Encrypted Multi-Maps.
IACR Cryptol. ePrint Arch., 2019
On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 38th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, 2019
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018
Proceedings of the 59th IEEE Annual Symposium on Foundations of Computer Science, 2018
Proceedings of the Computer Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
2012
Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens.
Proceedings of the Applied Cryptography and Network Security, 2012
2010
2005
Proceedings of the Topics in Cryptology, 2005
2004
Eur. Trans. Telecommun., 2004
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004
2003
IEEE Wirel. Commun., 2003
2002
Bell Labs Tech. J., 2002
Proceedings of the Selected Areas in Cryptography, 2002
Proceedings of the Selected Areas in Cryptography, 2002
2001
2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
Proceedings of the Advances in Cryptology, 1999
1998
Proceedings of the Selected Areas in Cryptography '98, 1998
Proceedings of the Advances in Cryptology, 1998
1997
IEEE Wirel. Commun., 1997
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
Proceedings of the 1997 IEEE International Conference on Acoustics, 1997
1996
Proceedings of the Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, 1996
1995
Proceedings of the 1995 International Conference on Acoustics, 1995