Shashank Agrawal

According to our database1, Shashank Agrawal authored at least 46 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
CASE: A New Frontier in Public-Key Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2023

White-Box Cryptography with Global Device Binding from Message-Recoverable Signatures and Token-Based Obfuscation.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2023

2022
An accurate and noninvasive skin cancer screening based on imaging technique.
Int. J. Imaging Syst. Technol., 2022

Early breast cancer diagnosis using cogent activation function-based deep learning implementation on screened mammograms.
Int. J. Imaging Syst. Technol., 2022

CoRA: Collaborative Risk-Aware Authentication.
IACR Cryptol. ePrint Arch., 2022

ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model.
IACR Cryptol. ePrint Arch., 2022

Secure Plot Transfer for the Chia Blockchain.
IACR Cryptol. ePrint Arch., 2022

2021
White-box Cryptography with Device Binding from Token-based Obfuscation and more.
IACR Cryptol. ePrint Arch., 2021

2D-2FA: A New Dimension in Two-Factor Authentication.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021

2020
KVaC: Key-Value Commitments for Blockchains and Beyond.
IACR Cryptol. ePrint Arch., 2020

Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching.
IACR Cryptol. ePrint Arch., 2020

BETA: Biometric Enabled Threshold Authentication.
IACR Cryptol. ePrint Arch., 2020

2019
Zether: Towards Privacy in a Smart Contract World.
IACR Cryptol. ePrint Arch., 2019

2018
DiSE: Distributed Symmetric-key Encryption.
IACR Cryptol. ePrint Arch., 2018

PASTA: PASsword-based Threshold Authentication.
IACR Cryptol. ePrint Arch., 2018

Non-Interactive Zero-Knowledge Proofs for Composite Statements.
IACR Cryptol. ePrint Arch., 2018

2017
FAME: Fast Attribute-based Message Encryption.
IACR Cryptol. ePrint Arch., 2017

Simplifying Design and Analysis of Complex Predicate Encryption Schemes.
IACR Cryptol. ePrint Arch., 2017

2016
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions.
IACR Cryptol. ePrint Arch., 2016

Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents.
IACR Cryptol. ePrint Arch., 2016

Impossibility of Simulation Secure Functional Encryption Even with Random Oracles.
IACR Cryptol. ePrint Arch., 2016

2015
Cryptographic agents
PhD thesis, 2015

A study of Pair Encodings: Predicate Encryption in prime order groups.
IACR Cryptol. ePrint Arch., 2015

Optimal Computational Split-state Non-malleable Codes.
IACR Cryptol. ePrint Arch., 2015

Kristin Lauter on Cryptography and Mathematics.
XRDS, 2015

Alice and Bob in the new world.
XRDS, 2015

A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

On the Practical Security of Inner Product Functional Encryption.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering and Permutations.
IACR Cryptol. ePrint Arch., 2014

Explicit Non-malleable Codes Resistant to Permutations and Perturbations.
IACR Cryptol. ePrint Arch., 2014

Towards a Unified Theory of Cryptographic Agents.
IACR Cryptol. ePrint Arch., 2014

Explicit Non-Malleable Codes Resistant to Permutations.
Electron. Colloquium Comput. Complex., 2014

Controlled Functional Encryption.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Interplay between (im)perfectness, synchrony and connectivity: The case of reliable message transmission.
Theor. Comput. Sci., 2013

On Fair Exchange, Fair Coins and Fair Sampling.
IACR Cryptol. ePrint Arch., 2013

Lower Bounds in the Hardware Token Model.
IACR Cryptol. ePrint Arch., 2013

Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results.
IACR Cryptol. ePrint Arch., 2013

Control of single-phase grid connected PV power plant for real as well as reactive power feeding.
Proceedings of the IEEE International Conference on Control Applications, 2013

2012
Verifiable secret sharing in a total of three rounds.
Inf. Process. Lett., 2012

2011
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks.
IACR Cryptol. ePrint Arch., 2011

Unconditionally Reliable Message Transmission in Directed Neighbour Networks.
IACR Cryptol. ePrint Arch., 2011

Secure Message Transmission In Asynchronous Directed Networks.
IACR Cryptol. ePrint Arch., 2011

Secure Message Transmission in Asynchronous Directed Graphs.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

2010
Brief Announcement: Synchronous Las Vegas URMT Iff Asynchronous Monte Carlo URMT.
Proceedings of the Distributed Computing, 24th International Symposium, 2010


  Loading...