Follow
Mukul R. Kulkarni
Mukul R. Kulkarni
Lead Cryptographer at Technology Innovation Institute Abu Dhabi
Verified email at tii.ae
Title
Cited by
Cited by
Year
Non-malleable codes for bounded depth, bounded fan-in circuits
M Ball, D Dachman-Soled, M Kulkarni, T Malkin
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
602016
Differentially-private multi-party sketching for large-scale statistics
SG Choi, D Dachman-Soled, M Kulkarni, A Yerukhimovich
Proceedings on Privacy Enhancing Technologies, 2020
452020
Non-malleable codes from average-case hardness:, decision trees, and streaming space-bounded tampering
M Ball, D Dachman-Soled, M Kulkarni, T Malkin
Annual International Conference on the Theory and Applications of …, 2018
442018
Non-malleable codes against bounded polynomial time tampering
M Ball, D Dachman-Soled, M Kulkarni, H Lin, T Malkin
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
262019
Tight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codes
D Dachman-Soled, M Kulkarni, A Shahverdi
Information and Computation 268, 104428, 2019
252019
Helping Johnny encrypt: Toward semantic interfaces for cryptographic frameworks
S Indela, M Kulkarni, K Nayak, T Dumitraş
Proceedings of the 2016 ACM International Symposium on New Ideas, New …, 2016
23*2016
Towards a ring analogue of the leftover hash lemma
D Dachman-Soled, H Gong, M Kulkarni, A Shahverdi
Journal of Mathematical Cryptology 15 (1), 87-110, 2020
18*2020
Code-based signatures from new proofs of knowledge for the syndrome decoding problem
L Bidoux, P Gaborit, M Kulkarni, V Mateu
Designs, Codes and Cryptography 91 (2), 497-544, 2023
172023
PERK
N Aaraj, S Bettaieb, L Bidoux, A Budroni, V Dyseryn, A Esser, P Gaborit, ...
122023
(In) security of ring-lwe under partial key exposure
D Dachman-Soled, H Gong, M Kulkarni, A Shahverdi
Journal of Mathematical Cryptology 15 (1), 72-86, 2020
12*2020
New techniques for zero-knowledge: Leveraging inefficient provers to reduce assumptions, interaction, and trust
M Ball, D Dachman-Soled, M Kulkarni
Annual International Cryptology Conference, 674-703, 2020
112020
Upper and lower bounds for continuous non-malleable codes
D Dachman-Soled, M Kulkarni
IACR International Workshop on Public Key Cryptography, 519-548, 2019
112019
Limits to non-malleability
M Ball, D Dachman-Soled, M Kulkarni, T Malkin
Cryptology ePrint Archive, 2019
92019
Local non-malleable codes in the bounded retrieval model
D Dachman-Soled, M Kulkarni, A Shahverdi
IACR International Workshop on Public Key Cryptography, 281-311, 2018
9*2018
Quasi-cyclic stern proof of knowledge
L Bidoux, P Gaborit, M Kulkarni, N Sendrier
2022 IEEE International Symposium on Information Theory (ISIT), 1459-1464, 2022
82022
Lattice Isomorphism as a Group Action and Hard Problems on Quadratic Forms.
A Budroni, JJ Chi-Domínguez, M Kulkarni
IACR Cryptol. ePrint Arch. 2023, 1093, 2023
52023
Don’t use it twice! solving relaxed linear code equivalence problems
A Budroni, JJ Chi-Domínguez, G D'Alconzo, AJ Di Scala, M Kulkarni
Cryptology ePrint Archive, 2024
42024
Properties of Lattice Isomorphism as a Cryptographic Group Action
B Benčina, A Budroni, JJ Chi-Domínguez, M Kulkarni
International Conference on Post-Quantum Cryptography, 170-201, 2024
12024
PERK: compact signature scheme based on a new variant of the permuted kernel problem
S Bettaieb, L Bidoux, V Dyseryn, A Esser, P Gaborit, M Kulkarni, ...
Designs, Codes and Cryptography, 1-27, 2024
12024
Security of NewHope Under Partial Key Exposure
D Dachman-Soled, H Gong, M Kulkarni, A Shahverdi
Research in Mathematics and Public Policy, 93-125, 2020
12020
The system can't perform the operation now. Try again later.
Articles 1–20