Suvradip Chakraborty

Orcid: 0000-0002-5352-4946

According to our database1, Suvradip Chakraborty authored at least 33 papers between 2015 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Forgetful Encryption.
IACR Cryptol. ePrint Arch., 2025

Non-interactive Key Exchange: New Notions, New Constructions, and Forward Security.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Malleable SNARKs and Their Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

TERRA: Trojan-Resilient Reverse-Firewall for Cryptographic Applications.
Proceedings of the Computer Security - ESORICS 2025, 2025

On Weak NIZKs, One-Way Functions and Amplification.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Logstar: Efficient Linear* Time Secure Merge.
IACR Cryptol. ePrint Arch., 2024

Key Exchange in the Post-snowden Era: Universally Composable Subversion-Resilient PAKE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Key Exchange in the Post-Snowden Era: UC Secure Subversion-Resilient PAKE.
IACR Cryptol. ePrint Arch., 2023

Efficiently Testable Circuits Without Conductivity.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

A Map of Witness Maps: New Definitions and Connections.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Efficiently Testable Circuits.
Proceedings of the 14th Innovations in Theoretical Computer Science Conference, 2023

Deniable Authentication When Signing Keys Leak.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Forward Security Under Leakage Resilience, Revisited.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023

2022
Universally Composable Subversion-Resilient Cryptography.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

COA-Secure Obfuscation and Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2021
Efficient single round attribute-based authenticated key exchange protocol.
Int. J. Comput. Math. Comput. Syst. Theory, 2021

Trojan-Resilience Without Cryptography.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Inverse-Sybil Attacks in Automated Contact Tracing.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

Reverse Firewalls for Adaptively Secure MPC Without Setup.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Forward-Security Under Continual Leakage with Deterministic Key Updates.
IACR Cryptol. ePrint Arch., 2020

Witness Maps and Applications.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Reverse Firewalls for Actively Secure MPCs.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Public Key Encryption Resilient to Post-challenge Leakage and Tampering Attacks.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

2017
Leakage-Resilient Tweakable Encryption from One-Way Functions.
IACR Cryptol. ePrint Arch., 2017

New Approach to Practical Leakage-Resilient Public-Key Cryptography.
IACR Cryptol. ePrint Arch., 2017

Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting.
Proceedings of the Provable Security, 2017

An Efficient Attribute-Based Authenticated Key Exchange Protocol.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

2015
An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks.
IACR Cryptol. ePrint Arch., 2015

Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2015

Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction.
Proceedings of the Provable Security, 2015


  Loading...