Srinath T. V. Setty

According to our database1, Srinath T. V. Setty authored at least 43 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Unlocking the lookup singularity with Lasso.
IACR Cryptol. ePrint Arch., 2023

Customizable constraint systems for succinct arguments.
IACR Cryptol. ePrint Arch., 2023

BabySpartan: Lasso-based SNARK for non-uniform computation.
IACR Cryptol. ePrint Arch., 2023

Revisiting the Nova Proof System on a Cycle of Curves.
IACR Cryptol. ePrint Arch., 2023

CycleFold: Folding-scheme-based recursive arguments over a cycle of elliptic curves.
IACR Cryptol. ePrint Arch., 2023

HyperNova: Recursive arguments for customizable constraint systems.
IACR Cryptol. ePrint Arch., 2023

Jolt: SNARKs for Virtual Machines via Lookups.
IACR Cryptol. ePrint Arch., 2023

Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs.
IACR Cryptol. ePrint Arch., 2023

Nimble: Rollback Protection for Confidential Cloud Services (extended version).
IACR Cryptol. ePrint Arch., 2023

Nimble: Rollback Protection for Confidential Cloud Services.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023

Brakedown: Linear-Time and Field-Agnostic SNARKs for R1CS.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
SuperNova: Proving universal machine executions without universal circuits.
IACR Cryptol. ePrint Arch., 2022

2021
Transparency Dictionaries with Succinct Proofs of Correct Operation.
IACR Cryptol. ePrint Arch., 2021

Linear-time zero-knowledge SNARKs for R1CS.
IACR Cryptol. ePrint Arch., 2021

Nova: Recursive Zero-Knowledge Arguments from Folding Schemes.
IACR Cryptol. ePrint Arch., 2021

Brakedown: Linear-time and post-quantum SNARKs for R1CS.
IACR Cryptol. ePrint Arch., 2021

FastVer: Making Data Integrity a Commodity.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

2020
Byzantine Ordered Consensus without Byzantine Oligarchy.
IACR Cryptol. ePrint Arch., 2020

Quarks: Quadruple-efficient transparent zkSNARKs.
IACR Cryptol. ePrint Arch., 2020

Verifiable state machines: Proofs that untrusted services operate correctly.
IACR Cryptol. ePrint Arch., 2020

Replicated state machines without replicated execution.
IACR Cryptol. ePrint Arch., 2020

Visor: Privacy-Preserving Video Analytics as a Cloud Service.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
Spartan: Efficient and general-purpose zkSNARKs without trusted setup.
IACR Cryptol. ePrint Arch., 2019

Veritas: Shared Verifiable Databases and Tables in the Cloud.
Proceedings of the 9th Biennial Conference on Innovative Data Systems Research, 2019

2018
Proving the correct execution of concurrent services in zero-knowledge.
IACR Cryptol. ePrint Arch., 2018

2017
PIR with compressed queries and amortized query processing.
IACR Cryptol. ePrint Arch., 2017

IronFleet: proving safety and liveness of practical distributed systems.
Commun. ACM, 2017

Vale: Verifying High-Performance Cryptographic Assembly Code.
Proceedings of the 26th USENIX Security Symposium, 2017

2016
Realizing the Fault-Tolerance Promise of Cloud Storage Using Locks with Intent.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016

Unobservable Communication over Fully Untrusted Infrastructure.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016

Scalable and Private Media Consumption with Popcorn.
Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation, 2016

2015
Scalable and private media consumption with Popcorn.
IACR Cryptol. ePrint Arch., 2015

IronFleet: proving practical distributed systems correct.
Proceedings of the 25th Symposium on Operating Systems Principles, 2015

2014
Efficient RAM and control flow in verifiable outsourced computation.
IACR Cryptol. ePrint Arch., 2014

2013
Verifying computations with state.
IACR Cryptol. ePrint Arch., 2013

A Hybrid Architecture for Interactive Verifiable Computation.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
Taking proof-based verified computation a few steps closer to practicality (extended version).
IACR Cryptol. ePrint Arch., 2012

Resolving the conflict between generality and plausibility in verified computation.
IACR Cryptol. ePrint Arch., 2012

Taking Proof-Based Verified Computation a Few Steps Closer to Practicality.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Making argument systems for outsourced computation practical (sometimes).
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
Depot: Cloud Storage with Minimal Trust.
ACM Trans. Comput. Syst., 2011

Repair from a Chair: Computer Repair as an Untrusted Cloud Service.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011

2010
Airavat: Security and Privacy for MapReduce.
Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation, 2010


  Loading...