Follow
Manoj Prabhakaran
Manoj Prabhakaran
Computer Science and Engineering, IIT Bombay
Verified email at cse.iitb.ac.in
Title
Cited by
Cited by
Year
Attribute-based signatures
H Maji, M Prabhakaran, M Rosulek
Topics in Cryptology–CT-RSA 2011, 376-392, 2011
699*2011
Founding cryptography on oblivious transfer–efficiently
Y Ishai, M Prabhakaran, A Sahai
Advances in Cryptology–CRYPTO 2008: 28th Annual International Cryptology …, 2008
5222008
The smallest grammar problem
M Charikar, E Lehman, D Liu, R Panigrahy, M Prabhakaran, A Sahai, ...
Information Theory, IEEE Transactions on 51 (7), 2554-2576, 2005
481*2005
Dynamic searchable encryption via blind storage
M Naveed, M Prabhakaran, CA Gunter
2014 IEEE Symposium on Security and Privacy, 639-654, 2014
3682014
Positive results and techniques for obfuscation
B Lynn, M Prabhakaran, A Sahai
Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004
3272004
Concurrent zero knowledge with logarithmic round-complexity
M Prabhakaran, A Rosen, A Sahai
Foundations of Computer Science, 2002. Proceedings. The 43rd Annual IEEE …, 2002
2402002
Attribute-sets: A practically motivated enhancement to attribute-based encryption
R Bobba, H Khurana, M Prabhakaran
Computer Security–ESORICS 2009: 14th European Symposium on Research in …, 2009
2222009
Private circuits II: Keeping secrets in tamperable circuits
Y Ishai, M Prabhakaran, A Sahai, D Wagner
Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference …, 2006
1992006
New notions of security: achieving universal composability without trusted setup
M Prabhakaran, A Sahai
Proceedings of the thirty-sixth annual ACM symposium on Theory of computing …, 2004
1662004
Secure arithmetic computation with no honest majority
Y Ishai, M Prabhakaran, A Sahai
Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San …, 2009
1512009
Efficient non-interactive secure computation
Y Ishai, E Kushilevitz, R Ostrovsky, M Prabhakaran, A Sahai
Advances in Cryptology–EUROCRYPT 2011: 30th Annual International Conference …, 2011
1362011
On the (im) possibility of cryptography with imperfect randomness
Y Dodis, SJ Ong, M Prabhakaran, A Sahai
45th Annual IEEE Symposium on Foundations of Computer Science, 196-205, 2004
1152004
Circuits resilient to additive attacks with applications to secure computation
D Genkin, Y Ishai, MM Prabhakaran, A Sahai, E Tromer
Proceedings of the forty-sixth annual ACM symposium on Theory of computing …, 2014
982014
Concurrent non-malleable zero knowledge
B Barak, M Prabhakaran, A Sahai
2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06 …, 2006
982006
Resource fairness and composability of cryptographic protocols
J Garay, P MacKenzie, M Prabhakaran, K Yang
Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006 …, 2006
922006
Rerandomizable RCCA encryption
M Prabhakaran, M Rosulek
Advances in Cryptology-CRYPTO 2007: 27th Annual International Cryptology …, 2007
852007
Concurrent general composition of secure protocols in the timing model
YT Kalai, Y Lindell, M Prabhakaran
Proceedings of the thirty-seventh annual ACM Symposium on Theory of …, 2005
85*2005
A rate-optimizing compiler for non-malleable codes against bit-wise tampering and permutations
S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
712015
Controlled functional encryption
M Naveed, S Agrawal, M Prabhakaran, XF Wang, E Ayday, JP Hubaux, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
712014
On randomized broadcasting and gossiping in radio networks
D Liu, M Prabhakaran
Computing and Combinatorics: 8th Annual International Conference, COCOON …, 2002
702002
The system can't perform the operation now. Try again later.
Articles 1–20