Follow
Hemanta K. Maji
Hemanta K. Maji
Department of Computer Science, Purdue University
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
Attribute-based signatures
HK Maji, M Prabhakaran, M Rosulek
Topics in Cryptology–CT-RSA 2011: The Cryptographers’ Track at the RSA …, 2011
5582011
Attribute-based signatures: Achieving attribute-privacy and collusion-resistance
H Maji, M Prabhakaran, M Rosulek
Cryptology ePrint Archive, 2008
2992008
Zeroizing without low-level zeroes: New MMAP attacks and their limitations
JS Coron, C Gentry, S Halevi, T Lepoint, HK Maji, E Miles, M Raykova, ...
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
1832015
A rate-optimizing compiler for non-malleable codes against bit-wise tampering and permutations
S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
722015
Optimal computational split-state non-malleable codes
D Aggarwal, S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran
Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv …, 2015
642015
Complexity of multi-party computation problems: The case of 2-party symmetric secure function evaluation
HK Maji, M Prabhakaran, M Rosulek
Theory of Cryptography: 6th Theory of Cryptography Conference, TCC 2009, San …, 2009
582009
Explicit non-malleable codes against bit-wise tampering and permutations
S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
572015
Zeroizing without zeroes: Cryptanalyzing multilinear maps without encodings of zero
C Gentry, S Halevi, HK Maji, A Sahai
Cryptology ePrint Archive, 2014
522014
A zero-one law for cryptographic complexity with respect to computational UC security
HK Maji, M Prabhakaran, M Rosulek
Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010
342010
A unified characterization of completeness and triviality for secure function evaluation
HK Maji, M Prabhakaran, M Rosulek
Progress in Cryptology-INDOCRYPT 2012: 13th International Conference on …, 2012
322012
Stateless cryptographic protocols
V Goyal, HK Maji
2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, 678-687, 2011
262011
On the computational complexity of coin flipping
HK Maji, M Prabhakaran, A Sahai
2010 IEEE 51st Annual Symposium on Foundations of Computer Science, 613-622, 2010
262010
Computational complexity of statistical machine translation
R Udupa, HK Maji
11th Conference of the European Chapter of the Association for Computational …, 2006
262006
Attribute-based signatures
HK Maji, M Prabhakaran, M Rosulek
Cryptology ePrint Archive, 2010
252010
A full characterization of completeness for two-party randomized function evaluation
D Kraschewski, HK Maji, M Prabhakaran, A Sahai
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
242014
Limits of random oracles in secure computation
M Mahmoody, HK Maji, M Prabhakaran
Proceedings of the 5th conference on Innovations in theoretical computer …, 2014
232014
Limits of random oracles in secure computation
M Mahmoody, HK Maji, M Prabhakaran
Proceedings of the 5th conference on Innovations in theoretical computer …, 2014
232014
Explicit non-malleable codes resistant to permutations and perturbations
S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran
Cryptology ePrint Archive, 2014
232014
Bounded-communication leakage resilience via parity-resilient circuits
V Goyal, Y Ishai, HK Maji, A Sahai, AA Sherstov
2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS), 1-10, 2016
212016
Secure computation from elastic noisy channels
D Khurana, HK Maji, A Sahai
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
202016
The system can't perform the operation now. Try again later.
Articles 1–20