Correlated-input secure hash functions V Goyal, A O’Neill, V Rao Theory of Cryptography Conference, 182-200, 2011 | 117 | 2011 |
Round optimal blind signatures S Garg, V Rao, A Sahai, D Schröder, D Unruh Annual Cryptology Conference, 630-648, 2011 | 57 | 2011 |
Adaptively secure, universally composable, multiparty computation in constant rounds D Dachman-Soled, J Katz, V Rao Theory of Cryptography Conference, 586-613, 2015 | 53 | 2015 |
Adaptive security of constrained PRFs G Fuchsbauer, M Konstantinov, K Pietrzak, V Rao International Conference on the Theory and Application of Cryptology and …, 2014 | 44 | 2014 |
Standard security does not imply indistinguishability under selective opening D Hofheinz, V Rao, D Wichs Theory of Cryptography Conference, 121-145, 2016 | 36 | 2016 |
Achieving differential privacy in secure multiparty data aggregation protocols on star networks V Bindschaedler, S Rane, AE Brito, V Rao, E Uzun Proceedings of the Seventh ACM on Conference on Data and Application …, 2017 | 26 | 2017 |
Revisiting lower and upper bounds for selective decommitments R Ostrovsky, V Rao, A Scafuro, I Visconti Theory of Cryptography Conference, 559-578, 2013 | 22 | 2013 |
Adaptively secure multi-party computation from LWE (via equivocal FHE) I Damgård, A Polychroniadou, V Rao Public-Key Cryptography--PKC 2016, 208-233, 2016 | 17 | 2016 |
Multi-party key exchange for unbounded parties from indistinguishability obfuscation D Khurana, V Rao, A Sahai International Conference on the Theory and Application of Cryptology and …, 2015 | 10 | 2015 |
Method for differentially private aggregation in a star topology under a realistic adversarial model S Rane, V Bindschaedler, AE Brito, E Uzun, V Rao US Patent 10,223,547, 2019 | 9 | 2019 |
Adaptive multiparty non-interactive key exchange without setup in the standard model V Rao Cryptology ePrint Archive, 2014 | 8 | 2014 |
On selective-opening attacks against encryption schemes R Ostrovsky, V Rao, I Visconti International Conference on Security and Cryptography for Networks, 578-597, 2014 | 7 | 2014 |
Statistical concurrent non-malleable zero knowledge C Orlandi, R Ostrovsky, V Rao, A Sahai, I Visconti Theory of Cryptography Conference, 167-191, 2014 | 6 | 2014 |
Adaptively secure uc constant round multi-party computation I Damgard, A Polychroniadou, V Rao Cryptology ePrint Archive, Report 2014/845, 2014. http://eprint. iacr. org, 2014 | 5 | 2014 |
Computer-implemented system and method for protecting sensitive data via data re-encryption V Rao, S Rane, E Uzun, AE Brito US Patent 10,277,563, 2019 | 3 | 2019 |
On the (in) security of Fischlin’s paradigm P Ananth, R Bhaskar, V Goyal, V Rao Theory of Cryptography Conference, 202-221, 2013 | 3 | 2013 |
System and architecture for analytics on encrypted databases S Rane, V Bindschaedler, AE Brito, E Uzun, V Rao US Patent 10,846,423, 2020 | 1 | 2020 |
Secure two-party feature selection V Rao, Y Long, H Eldardiry, S Rane, R Rossi, F Torres arXiv preprint arXiv:1901.00832, 2019 | 1 | 2019 |
Adaptively secure multi-party computation from lwe (via equivocal fhe) I Damgård, A Polychroniadou, V Rao Cryptology ePrint Archive, 2014 | 1 | 2014 |
Adaptively Secure UC Constant Round Multi-Party Computation Protocols. I Damgård, A Polychroniadou, V Rao IACR Cryptol. ePrint Arch. 2014, 830, 2014 | 1 | 2014 |