Suvradip Chakraborty

Orcid: 0000-0002-5352-4946

According to our database1, Suvradip Chakraborty authored at least 27 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Logstar: Efficient Linear* Time Secure Merge.
IACR Cryptol. ePrint Arch., 2024

2023
A Map of Witness Maps: New Definitions and Connections.
IACR Cryptol. ePrint Arch., 2023

Key Exchange in the Post-Snowden Era: UC Secure Subversion-Resilient PAKE.
IACR Cryptol. ePrint Arch., 2023

Deniable Authentication when Signing Keys Leak.
IACR Cryptol. ePrint Arch., 2023

Efficiently Testable Circuits without Conductivity.
IACR Cryptol. ePrint Arch., 2023

Forward Security Under Leakage Resilience, Revisited.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023

2022
Universally Composable Subversion-Resilient Cryptography.
IACR Cryptol. ePrint Arch., 2022

Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2022

COA-Secure Obfuscation and Applications.
IACR Cryptol. ePrint Arch., 2022

Efficiently Testable Circuits.
IACR Cryptol. ePrint Arch., 2022

2021
Efficient single round attribute-based authenticated key exchange protocol.
Int. J. Comput. Math. Comput. Syst. Theory, 2021

Reverse Firewalls for Adaptively Secure MPC without Setup.
IACR Cryptol. ePrint Arch., 2021

Trojan-Resilience without Cryptography.
IACR Cryptol. ePrint Arch., 2021

2020
Witness Maps and Applications.
IACR Cryptol. ePrint Arch., 2020

Forward-Security Under Continual Leakage with Deterministic Key Updates.
IACR Cryptol. ePrint Arch., 2020

Inverse-Sybil Attacks in Automated Contact Tracing.
IACR Cryptol. ePrint Arch., 2020

2019
Reverse Firewalls for Actively Secure MPCs.
IACR Cryptol. ePrint Arch., 2019

2018
Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks.
IACR Cryptol. ePrint Arch., 2018

2017
Leakage-Resilient Tweakable Encryption from One-Way Functions.
IACR Cryptol. ePrint Arch., 2017

Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE.
IACR Cryptol. ePrint Arch., 2017

New Approach to Practical Leakage-Resilient Public-Key Cryptography.
IACR Cryptol. ePrint Arch., 2017

Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting.
Proceedings of the Provable Security, 2017

An Efficient Attribute-Based Authenticated Key Exchange Protocol.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

2015
An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks.
IACR Cryptol. ePrint Arch., 2015

Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2015

Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction.
Proceedings of the Provable Security, 2015


  Loading...