Sruthi Sekar
Sruthi Sekar
Verified email at - Homepage
Cited by
Cited by
Four-state non-malleable codes with explicit constant rate
B Kanukurthi, SLB Obbattu, S Sekar
Journal of Cryptology 33 (3), 1044-1079, 2020
Non-malleable randomness encoders and their applications
B Kanukurthi, SLB Obbattu, S Sekar
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
Registration-based encryption from standard assumptions
S Garg, M Hajiabadi, M Mahmoody, A Rahimi, S Sekar
Public-Key Cryptography–PKC 2019: 22nd IACR International Conference on …, 2019
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI
N Chandran, N Dasgupta, D Gupta, SLB Obbattu, S Sekar, A Shah
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
Privacy amplification from non-malleable codes
E Chattopadhyay, B Kanukurthi, SLB Obbattu, S Sekar
Progress in Cryptology–INDOCRYPT 2019: 20th International Conference on …, 2019
Rate one-third non-malleable codes
D Aggarwal, B Kanukurthi, SLB Obbattu, M Obremski, S Sekar
Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing …, 2022
Adaptive extractors and their application to leakage resilient secret sharing
N Chandran, B Kanukurthi, SLB Obbattu, S Sekar
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
Locally reconstructable non-malleable secret sharing
B Kanukurthi, SLB Obbattu, S Sekar, J Tomy
Cryptology ePrint Archive, 2021
Constant Rate (Non-malleable) Secret Sharing Schemes Tolerating Joint Adaptive Leakage.
N Chandran, B Kanukurthi, SLB Obbattu, S Sekar
IACR Cryptol. ePrint Arch. 2020, 1252, 2020
IBE with Incompressible Master Secret and Small Identity Secrets
N Döttling, S Garg, S Sekar, M Wang
Theory of Cryptography: 20th International Conference, TCC 2022, Chicago, IL …, 2023
Short Leakage Resilient and Non-malleable Secret Sharing Schemes
N Chandran, B Kanukurthi, SLB Obbattu, S Sekar
Advances in Cryptology–CRYPTO 2022: 42nd Annual International Cryptology …, 2022
Near Optimal Non-malleable Codes and Leakage Resilient Secret Sharing Schemes
S Sekar
The system can't perform the operation now. Try again later.
Articles 1–12