Shashank Agrawal

According to our database1, Shashank Agrawal authored at least 46 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
CASE: A New Frontier in Public-Key Authenticated Encryption.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

White-Box Cryptography with Global Device Binding from Message-Recoverable Signatures and Token-Based Obfuscation.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2023

2022
An accurate and noninvasive skin cancer screening based on imaging technique.
Int. J. Imaging Syst. Technol., 2022

Early breast cancer diagnosis using cogent activation function-based deep learning implementation on screened mammograms.
Int. J. Imaging Syst. Technol., 2022

CoRA: Collaborative Risk-Aware Authentication.
IACR Cryptol. ePrint Arch., 2022

Secure Plot Transfer for the Chia Blockchain.
IACR Cryptol. ePrint Arch., 2022

ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

2021
White-box Cryptography with Device Binding from Token-based Obfuscation and more.
IACR Cryptol. ePrint Arch., 2021

BETA: Biometric-Enabled Threshold Authentication.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

2D-2FA: A New Dimension in Two-Factor Authentication.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
Zether: Towards Privacy in a Smart Contract World.
Proceedings of the Financial Cryptography and Data Security, 2020

Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

KVaC: Key-Value Commitments for Blockchains and Beyond.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2018
Impossibility of Simulation Secure Functional Encryption Even with Random Oracles.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Non-Interactive Zero-Knowledge Proofs for Composite Statements.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

DiSE: Distributed Symmetric-key Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

PASTA: PASsword-based Threshold Authentication.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Simplifying Design and Analysis of Complex Predicate Encryption Schemes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

FAME: Fast Attribute-based Message Encryption.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

A Study of Pair Encodings: Predicate Encryption in Prime Order Groups.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Optimal Computational Split-state Non-malleable Codes.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

2015
Cryptographic agents
PhD thesis, 2015

Kristin Lauter on Cryptography and Mathematics.
XRDS, 2015

Alice and Bob in the new world.
XRDS, 2015

A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

On the Practical Security of Inner Product Functional Encryption.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering and Permutations.
IACR Cryptol. ePrint Arch., 2014

Explicit Non-malleable Codes Resistant to Permutations and Perturbations.
IACR Cryptol. ePrint Arch., 2014

Towards a Unified Theory of Cryptographic Agents.
IACR Cryptol. ePrint Arch., 2014

Explicit Non-Malleable Codes Resistant to Permutations.
Electron. Colloquium Comput. Complex., 2014

Lower Bounds in the Hardware Token Model.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Controlled Functional Encryption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results.
IACR Cryptol. ePrint Arch., 2013

On Fair Exchange, Fair Coins and Fair Sampling.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Control of single-phase grid connected PV power plant for real as well as reactive power feeding.
Proceedings of the IEEE International Conference on Control Applications, 2013

2012
Verifiable secret sharing in a total of three rounds.
Inf. Process. Lett., 2012

Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission.
Proceedings of the Distributed Computing and Networking - 13th International Conference, 2012

2011
Unconditionally Reliable Message Transmission in Directed Neighbour Networks.
IACR Cryptol. ePrint Arch., 2011

Secure Message Transmission In Asynchronous Directed Networks.
IACR Cryptol. ePrint Arch., 2011

Secure Message Transmission in Asynchronous Directed Graphs.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks.
Proceedings of the Information Theoretic Security - 5th International Conference, 2011

2010
Brief Announcement: Synchronous Las Vegas URMT Iff Asynchronous Monte Carlo URMT.
Proceedings of the Distributed Computing, 24th International Symposium, 2010


  Loading...