Satrajit Ghosh

Orcid: 0000-0003-2657-5286

According to our database1, Satrajit Ghosh authored at least 21 papers between 2011 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Standards in the Preparation of Biomedical Research Metadata: A Bridge2AI Perspective.
CoRR, September, 2025

Evaluating Contrast Localizer for Identifying Causal Units in Social & Mathematical Tasks in Language Models.
CoRR, August, 2025

The Bridge2AI-voice application: initial feasibility study of voice data acquisition through mobile health.
Frontiers Digit. Health, 2025

Interactive Panel Summaries of the 2024 Voice AI Symposium.
Frontiers Digit. Health, 2025

TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic Applications.
Proceedings of the Computer Security - ESORICS 2025, 2025

2024
Developing Multi-Disorder Voice Protocols: A team science approach involving clinical expertise, bioethics, standards, and DEI.
Proceedings of the 25th Annual Conference of the International Speech Communication Association, 2024

2023
Threshold Private Set Intersection with Better Communication Complexity.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Improved Distributed RSA Key Generation Using the Miller-Rabin Test.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Practical Non-malleable Codes from Symmetric-Key Primitives in 2-Split-State Model.
Proceedings of the Provable and Practical Security, 2022

2021
Uncertainty-Aware Boosted Ensembling in Multi-Modal Settings.
Proceedings of the International Joint Conference on Neural Networks, 2021

2020
Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
An Algebraic Approach to Maliciously Secure Private Set Intersection.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

The Communication Complexity of Threshold Private Set Intersection.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2017
TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2015
Post-Quantum Secure Onion Routing (Future Anonymity in Today's Budget).
IACR Cryptol. ePrint Arch., 2015

Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget).
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Algorithms for rotation symmetric Boolean functions.
Int. J. Inf. Coding Theory, 2014

2012
Improvements of Algebraic Attacks Based on Structured Gaussian Elimination.
IACR Cryptol. ePrint Arch., 2012

A novel approach for identification of symmetric switching function.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

2011
An Improvement of Linearization-Based Algebraic Attacks.
Proceedings of the Security Aspects in Information Technology, 2011


  Loading...