Yashvanth Kondi

According to our database1, Yashvanth Kondi authored at least 20 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
OneTwoPAKE: Two-Round Strong Asymmetric PAKE with Ideal Security.
IACR Cryptol. ePrint Arch., 2025

Two-party ECDSA Signing at Constant Communication Overhead.
IACR Cryptol. ePrint Arch., 2025

Separating Broadcast from Cheater Identification.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
Threshold ECDSA in Three Rounds.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Sometimes You Can't Distribute Random-Oracle-Based Proofs.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Secure Multiparty Computation with Identifiable Abort via Vindicating Release.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Secure Multiparty Computation with Identifiable Abort from Vindicating Release.
IACR Cryptol. ePrint Arch., 2023

Threshold BBS+ Signatures for Distributed Anonymous Credential Issuance.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Witness-Succinct Universally-Composable SNARKs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Two-Round Stateless Deterministic Two-Party Schnorr Signatures from Pseudorandom Correlation Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
Guaranteed Output in $O(\sqrt{n})$ Rounds for Round-Robin Sampling Protocols.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Improved Straight-Line Extraction in the Random Oracle Model with Applications to Signature Aggregation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Non-interactive Half-Aggregation of EdDSA and Variants of Schnorr Signatures.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Multiparty Generation of an RSA Modulus.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Threshold ECDSA from ECDSA Assumptions: The Multiparty Case.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
Secure Two-party Threshold ECDSA from ECDSA Assumptions.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Efficient Adaptively Secure Zero-Knowledge from Garbled Circuits.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

2017
Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017


  Loading...