Vanishree Rao

According to our database1, Vanishree Rao authored at least 21 papers between 2011 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Paras - A Private NFT Protocol.
IACR Cryptol. ePrint Arch., 2022

Mina - A Blockchain in its True Sense.
Proceedings of the 4th Workshop on Distributed Ledger Technology co-located with the Italian Conference on Cybersecurity 2022 (ITASEC 2022), 2022

2020
Coda: Decentralized Cryptocurrency at Scale.
IACR Cryptol. ePrint Arch., 2020

2019
Secure Two-Party Feature Selection.
CoRR, 2019

2017
Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

2016
Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE).
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

2015
Adaptively-secure Multiparty Non-interactive Key Exchange.
PhD thesis, 2015

Standard Security Does Not Imply Indistinguishability Under Selective Opening.
IACR Cryptol. ePrint Arch., 2015

Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015

Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model.
IACR Cryptol. ePrint Arch., 2014

Statistical Concurrent Non-Malleable Zero Knowledge.
IACR Cryptol. ePrint Arch., 2014

Adaptive Security of Constrained PRFs.
IACR Cryptol. ePrint Arch., 2014

Adaptively Secure UC Constant Round Multi-Party Computation Protocols.
IACR Cryptol. ePrint Arch., 2014

Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds.
IACR Cryptol. ePrint Arch., 2014

On Selective-Opening Attacks against Encryption Schemes.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

2013
An auto-review tool for model-based testing of safety-critical systems.
Proceedings of the 2013 International Workshop on Joining AcadeMiA and Industry Contributions to testing Automation, 2013

2012
On the (In)security of Fischlin's Paradigm.
IACR Cryptol. ePrint Arch., 2012

2011
Revisiting Lower and Upper Bounds for Selective Decommitments.
IACR Cryptol. ePrint Arch., 2011

Correlated-Input Secure Hash Functions.
IACR Cryptol. ePrint Arch., 2011

Round Optimal Blind Signatures.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011


  Loading...