Satyanarayana V. Lokam

Orcid: 0000-0002-0218-6668

Affiliations:
  • Microsoft Research India, Bangalore, India


According to our database1, Satyanarayana V. Lokam authored at least 38 papers between 1995 and 2023.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Dew: A Transparent Constant-Sized Polynomial Commitment Scheme.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

2022
Dew: Transparent Constant-sized zkSNARKs.
IACR Cryptol. ePrint Arch., 2022

2020
ϵ-MSR Codes: Contacting Fewer Code Blocks for Exact Repair.
IEEE Trans. Inf. Theory, 2020

2018
Fourier Entropy-Influence Conjecture for Random Linear Threshold Functions.
Proceedings of the LATIN 2018: Theoretical Informatics, 2018

∊-MSR Codes: Contacting Fewer Code Blocks for Exact Repair.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
HOP: Hardware makes Obfuscation Practical.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

2016
Upper bounds on Fourier entropy.
Theor. Comput. Sci., 2016

On the Sensitivity Conjecture for Read-k Formulas.
Electron. Colloquium Comput. Complex., 2016

2015
On Restricting No-Junta Boolean Function and Degree Lower Bounds by Polynomial Method.
CoRR, 2015

Restrictions of nondegenerate Boolean functions and degree lower bounds over different rings.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Weight enumerators and higher support weights of maximally recoverable codes.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

2014
Using Elimination Theory to Construct Rigid Matrices.
Comput. Complex., 2014

2012
On Black-Box Reductions between Predicate Encryption Schemes.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Reconstruction of depth-4 multilinear circuits with top fan-in 2.
Proceedings of the 44th Symposium on Theory of Computing Conference, 2012

On-Line/Off-Line Leakage Resilient Secure Computation Protocols.
Proceedings of the Progress in Cryptology, 2012

2011
Reconstruction of Depth-4 Multilinear Circuits with Top fanin 2.
Electron. Colloquium Comput. Complex., 2011

Efficient Reconstruction of Random Multilinear Formulas.
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011

2010
Forcing Out a Confession - Threshold Discernible Ring Signatures.
Proceedings of the SECRYPT 2010, 2010

Threshold Discernible Ring Signatures.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

2009
Complexity Lower Bounds using Linear Algebra.
Found. Trends Theor. Comput. Sci., 2009

2008
On The Diffie-Hellman Assumption.
IACR Cryptol. ePrint Arch., 2008

Improved Bounds on Security Reductions for Discrete Log Based Signatures.
Proceedings of the Advances in Cryptology, 2008

2007
Vulnerabilities in Anonymous Credential Systems.
Proceedings of the 3rd International Workshop on Security and Trust Management, 2007

2006
An optimal lower bound for 2-query locally decodable linear codes.
Inf. Process. Lett., 2006

Quadratic Lower Bounds on Matrix Rigidity.
Proceedings of the Theory and Applications of Models of Computation, 2006

2005
Lower bounds for adaptive locally decodable codes.
Random Struct. Algorithms, 2005

2003
Communication Complexity of Simultaneous Messages.
SIAM J. Comput., 2003

Graph Complexity and Slice Functions.
Theory Comput. Syst., 2003

Width-Based Algorithms for SAT and CIRCUIT-SAT: (Extended Abstract).
Proceedings of the Theory and Applications of Satisfiability Testing, 2003

2002
Better Lower Bounds for Locally Decodable Codes.
Proceedings of the 17th Annual IEEE Conference on Computational Complexity, 2002

2001
Spectral Methods for Matrix Rigidity with Applications to Size-Depth Trade-offs and Communication Complexity.
J. Comput. Syst. Sci., 2001

Relations Between Communication Complexity, Linear Arrangements, and Computational Complexity.
Proceedings of the FST TCS 2001: Foundations of Software Technology and Theoretical Computer Science, 2001

2000
On the rigidity of Vandermonde matrices.
Theor. Comput. Sci., 2000

Imroved Upper Bounds on the Simultaneous Messages Complexity of the Generalized Addressing Function.
Proceedings of the LATIN 2000: Theoretical Informatics, 2000

1998
Remarks on Graph Complexity.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1998

1995
Simultaneous Messages vs. Communication.
Proceedings of the STACS 95, 1995

Logspace Verifiers, NC, and NP.
Proceedings of the Algorithms and Computation, 6th International Symposium, 1995

Spectral Methods for Matrix Rigidity with Applications to Size-Depth Tradeoffs and Communication Complexity.
Proceedings of the 36th Annual Symposium on Foundations of Computer Science, 1995


  Loading...