Vipul Goyal
Affiliations:- Carnegie Mellon University, Pittsburgh, PA, USA
According to our database1,
Vipul Goyal
authored at least 156 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cs.cmu.edu
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
How to Copy-Protect Malleable-Puncturable Cryptographic Functionalities Under Arbitrary Challenge Distributions.
IACR Cryptol. ePrint Arch., 2025
How to Copy-Protect All Puncturable Functionalities Without Conjectures: A Unified Solution to Quantum Protection.
IACR Cryptol. ePrint Arch., 2025
IACR Commun. Cryptol., 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
Towards Building Scalable Constant-Round MPC from Minimal Assumptions via Round Collapsing.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Unclonable Cryptography with Unbounded Collusions and Impossibility of Hyperefficient Shadow Tomography.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 18th Conference on the Theory of Quantum Computation, 2023
Proceedings of the 14th Innovations in Theoretical Computer Science Conference, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the 4th Conference on Information-Theoretic Cryptography, 2023
2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the Public-Key Cryptography - PKC 2022, 2022
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022
Proceedings of the 13th Innovations in Theoretical Computer Science Conference, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021
2020
SIAM J. Comput., 2020
IACR Cryptol. ePrint Arch., 2020
Electron. Colloquium Comput. Complex., 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, 2020
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020
Proceedings of the 61st IEEE Annual Symposium on Foundations of Computer Science, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Proceedings of the Theory of Cryptography - 17th International Conference, 2019
Proceedings of the 60th IEEE Annual Symposium on Foundations of Computer Science, 2019
Proceedings of the 60th IEEE Annual Symposium on Foundations of Computer Science, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, 2018
Predicting the Algorithmic Time Complexity of Single Parametric Algorithms Using Multiclass Classification with Gradient Boosted Trees.
Proceedings of the 2018 Eleventh International Conference on Contemporary Computing, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Theory of Cryptography - 15th International Conference, 2017
Proceedings of the Theory of Cryptography - 15th International Conference, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017
2016
Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, 2016
Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, 2016
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016
Proceedings of the IEEE 57th Annual Symposium on Foundations of Computer Science, 2016
Proceedings of the IEEE 57th Annual Symposium on Foundations of Computer Science, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the Symposium on Theory of Computing, 2014
Achieving Privacy in Verifiable Computation with Multiple Servers - Without FHE and without Pre-processing.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the 55th IEEE Annual Symposium on Foundations of Computer Science, 2014
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the Symposium on Theory of Computing Conference, 2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Progress in Cryptology, 2012
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012
Proceedings of the 53rd Annual IEEE Symposium on Foundations of Computer Science, 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the 43rd ACM Symposium on Theory of Computing, 2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the 42nd ACM Symposium on Theory of Computing, 2010
Proceedings of the Advances in Cryptology, 2010
Proceedings of the Advances in Cryptology, 2010
2009
Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy.
Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, 2009
2008
Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy.
IACR Cryptol. ePrint Arch., 2008
Universally Composable Multi-party Computation with an Unreliable Common Reference String.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Advances in Cryptology, 2007
2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Proceedings of the Information Security and Cryptology, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Certificate Revocation Lists or Online Mechanisms.
Proceedings of the Security In Information Systems, 2004
Proceedings of the Security and Protection in Information Processing Systems, 2004