Follow
Muthuramakrishnan Venkitasubramaniam
Muthuramakrishnan Venkitasubramaniam
Associate Professor of Computer Science, University of Rochester
Verified email at cs.rochester.edu - Homepage
Title
Cited by
Cited by
Year
L-diversity: Privacy beyond k-anonymity
A Machanavajjhala, D Kifer, J Gehrke, M Venkitasubramaniam
ACM Transactions on Knowledge Discovery from Data (TKDD) 1 (1), 3-es, 2007
63212007
Ligero: Lightweight sublinear arguments without a trusted setup
S Ames, C Hazay, Y Ishai, M Venkitasubramaniam
Proceedings of the 2017 acm sigsac conference on computer and communications …, 2017
3062017
Concurrent non-malleable commitments from any one-way function
H Lin, R Pass, M Venkitasubramaniam
Theory of Cryptography: Fifth Theory of Cryptography Conference, TCC 2008 …, 2008
1182008
A unified framework for concurrent security: universal composability from stand-alone non-malleability
H Lin, R Pass, M Venkitasubramaniam
Proceedings of the forty-first annual ACM symposium on Theory of computing …, 2009
1132009
Scalable multi-party private set-intersection
C Hazay, M Venkitasubramaniam
Public-Key Cryptography–PKC 2017: 20th IACR International Conference on …, 2017
872017
Round-optimal secure multi-party computation
S Halevi, C Hazay, A Polychroniadou, M Venkitasubramaniam
Journal of Cryptology 34 (3), 19, 2021
582021
Concurrent Non-Malleable Zero Knowledge Proofs.
H Lin, R Pass, WLD Tseng, M Venkitasubramaniam
CRYPTO 6223, 429-446, 2010
482010
On the power of secure two-party computation
C Hazay, M Venkitasubramaniam
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
462016
Ligero++: A new optimized sublinear IOP
R Bhadauria, Z Fang, C Hazay, M Venkitasubramaniam, T Xie, Y Zhang
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
442020
Cloud-based secure health monitoring: Optimizing fully-homomorphic encryption for streaming algorithms
A Page, O Kocabas, S Ames, M Venkitasubramaniam, T Soyata
2014 IEEE Globecom Workshops (GC Wkshps), 48-52, 2014
422014
An efficient parallel repetition theorem for arthur-merlin games
R Pass, M Venkitasubramaniam
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing …, 2007
402007
4-round resettably-sound zero knowledge
KM Chung, R Ostrovsky, R Pass, M Venkitasubramaniam, I Visconti
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014 …, 2014
382014
On constant-round concurrent zero-knowledge
R Pass, M Venkitasubramaniam
Lecture Notes in Computer Science 4948, 553-570, 2008
382008
Adaptive and concurrent secure computation from new adaptive, non-malleable commitments
D Dachman-Soled, T Malkin, M Raykova, M Venkitasubramaniam
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
352013
A Unified Framework for UC from Only OT.
R Pass, H Lin, M Venkitasubramaniam
ASIACRYPT 7658, 699-717, 2012
292012
Composable security in the tamper-proof hardware model under minimal complexity
C Hazay, A Polychroniadou, M Venkitasubramaniam
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016
282016
Diogenes: Lightweight scalable RSA modulus generation with a dishonest majority
M Chen, C Hazay, Y Ishai, Y Kashnikov, D Micciancio, T Riviere, A Shelat, ...
2021 IEEE Symposium on Security and Privacy (SP), 590-607, 2021
252021
LevioSA: Lightweight secure arithmetic computation
C Hazay, Y Ishai, A Marcedone, M Venkitasubramaniam
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
252019
Precise concurrent zero knowledge
O Pandey, R Pass, A Sahai, WLD Tseng, M Venkitasubramaniam
Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008
232008
On black-box complexity of universally composable security in the CRS model
C Hazay, M Venkitasubramaniam
Advances in Cryptology–ASIACRYPT 2015: 21st International Conference on the …, 2015
202015
The system can't perform the operation now. Try again later.
Articles 1–20