Sarvar Patel

According to our database1, Sarvar Patel authored at least 38 papers between 1995 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing.
IACR Cryptology ePrint Archive, 2019

Leakage Cell Probe Model: Lower Bounds for Key-Equality Mitigation in Encrypted Multi-Maps.
IACR Cryptology ePrint Archive, 2019

On Deploying Secure Computing Commercially: Private Intersection-Sum Protocols and their Business Applications.
IACR Cryptology ePrint Archive, 2019

What Storage Access Privacy is Achievable with Small Overhead?
CoRR, 2019

Protecting accounts from credential stuffing with password breach alerting.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
Private Stateful Information Retrieval.
IACR Cryptology ePrint Archive, 2018

PanORAMa: Oblivious RAM with Logarithmic Overhead.
IACR Cryptology ePrint Archive, 2018

CacheShuffle: A Family of Oblivious Shuffles.
Proceedings of the 45th International Colloquium on Automata, Languages, and Programming, 2018

2017
Symmetric Searchable Encryption with Sharing and Unsharing.
IACR Cryptology ePrint Archive, 2017

Recursive ORAMs with Practical Constructions.
IACR Cryptology ePrint Archive, 2017

Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions.
IACR Cryptology ePrint Archive, 2017

Practical Secure Aggregation for Privacy Preserving Machine Learning.
IACR Cryptology ePrint Archive, 2017

CacheShuffle: An Oblivious Shuffle Algorithm Using Caches.
CoRR, 2017

2016
Practical Secure Aggregation for Federated Learning on User-Held Data.
CoRR, 2016

2012
Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens.
Proceedings of the Applied Cryptography and Network Security, 2012

2010
Password-Authenticated Key (PAK) Diffie-Hellman Exchange.
RFC, February, 2010

Password-authenticated key exchange based on RSA.
Int. J. Inf. Sec., 2010

2005
Hard Bits of the Discrete Log with Applications to Password Authentication.
Proceedings of the Topics in Cryptology, 2005

2004
Secure and efficient voice-over-IP in a cdma2000® Network.
European Transactions on Telecommunications, 2004

Efficient Constructions of Variable-Input-Length Block Ciphers.
Proceedings of the Selected Areas in Cryptography, 11th International Workshop, 2004

2003
Efficient authentication and key distribution in wireless IP networks.
IEEE Wireless Commun., 2003

2002
Wireless network security architecture.
Bell Labs Technical Journal, 2002

A scheme for authentication and dynamic key exchange in wireless networks.
Bell Labs Technical Journal, 2002

Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive.
Proceedings of the Selected Areas in Cryptography, 2002

2001
An Efficient MAC for Short Messages.
IACR Cryptology ePrint Archive, 2001

Security for wireless internet access.
Bell Labs Technical Journal, 2001

2000
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman.
IACR Cryptology ePrint Archive, 2000

Downlink scheduling in CDMA data networks.
Proceedings of the MOBICOM 2000, 2000

1999
Towards Making Luby-Rackoff Ciphers Optimal and Practical.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

SOBER Crytanalysis.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions.
Proceedings of the Advances in Cryptology, 1999

1998
Over the Air Service Provisioning.
Proceedings of the Selected Areas in Cryptography '98, 1998

An Efficient Discrete Log Pseudo Random Generator.
Proceedings of the Advances in Cryptology, 1998

1997
Weaknesses of North American wireless authentication protocol.
IEEE Personal Commun., 1997

Number Theoretic Attacks on Secure Password Schemes.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

An O(N√E¯) Viterbi algorithm.
Proceedings of the 1997 IEEE International Conference on Acoustics, 1997

1996
Information leakage in encrypted key exchange.
Proceedings of the Network Threats, Proceedings of a DIMACS Workshop, December 2-4, 1996, 1996

1995
A lower-complexity Viterbi algorithm.
Proceedings of the 1995 International Conference on Acoustics, 1995


  Loading...