Attribute-based signatures HK Maji, M Prabhakaran, M Rosulek Topics in Cryptology–CT-RSA 2011: The Cryptographers’ Track at the RSA …, 2011 | 558 | 2011 |
Attribute-based signatures: Achieving attribute-privacy and collusion-resistance H Maji, M Prabhakaran, M Rosulek Cryptology ePrint Archive, 2008 | 299 | 2008 |
Zeroizing without low-level zeroes: New MMAP attacks and their limitations JS Coron, C Gentry, S Halevi, T Lepoint, HK Maji, E Miles, M Raykova, ... Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015 | 183 | 2015 |
A rate-optimizing compiler for non-malleable codes against bit-wise tampering and permutations S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015 | 72 | 2015 |
Optimal computational split-state non-malleable codes D Aggarwal, S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2015 | 64 | 2015 |
Complexity of multi-party computation problems: The case of 2-party symmetric secure function evaluation HK Maji, M Prabhakaran, M Rosulek Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San …, 2009 | 58 | 2009 |
Explicit non-malleable codes against bit-wise tampering and permutations S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015 | 57 | 2015 |
Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero C Gentry, S Halevi, HK Maji, A Sahai Cryptology ePrint Archive, 2014 | 52 | 2014 |
A zero-one law for cryptographic complexity with respect to computational UC security HK Maji, M Prabhakaran, M Rosulek Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010 | 34 | 2010 |
A unified characterization of completeness and triviality for secure function evaluation HK Maji, M Prabhakaran, M Rosulek Progress in Cryptology-INDOCRYPT 2012: 13th International Conference on …, 2012 | 32 | 2012 |
Stateless cryptographic protocols V Goyal, HK Maji 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, 678-687, 2011 | 26 | 2011 |
On the computational complexity of coin flipping HK Maji, M Prabhakaran, A Sahai 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 613-622, 2010 | 26 | 2010 |
Computational complexity of statistical machine translation R Udupa, HK Maji 11th Conference of the European Chapter of the Association for Computational …, 2006 | 26 | 2006 |
Attribute-based signatures HK Maji, M Prabhakaran, M Rosulek Cryptology ePrint Archive, 2010 | 25 | 2010 |
A full characterization of completeness for two-party randomized function evaluation D Kraschewski, HK Maji, M Prabhakaran, A Sahai Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014 | 24 | 2014 |
Limits of random oracles in secure computation M Mahmoody, HK Maji, M Prabhakaran Proceedings of the 5th conference on Innovations in theoretical computer …, 2014 | 23 | 2014 |
Limits of random oracles in secure computation M Mahmoody, HK Maji, M Prabhakaran Proceedings of the 5th conference on Innovations in theoretical computer …, 2014 | 23 | 2014 |
Explicit non-malleable codes resistant to permutations and perturbations S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran Cryptology ePrint Archive, 2014 | 23 | 2014 |
Bounded-communication leakage resilience via parity-resilient circuits V Goyal, Y Ishai, HK Maji, A Sahai, AA Sherstov 2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), 1-10, 2016 | 21 | 2016 |
Secure computation from elastic noisy channels D Khurana, HK Maji, A Sahai Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 20 | 2016 |