default search action
Suvradip Chakraborty
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i22]Suvradip Chakraborty, Stanislav Peceny, Srinivasan Raghuraman, Peter Rindal:
Logstar: Efficient Linear* Time Secure Merge. IACR Cryptol. ePrint Arch. 2024: 159 (2024) - 2023
- [c18]Suvradip Chakraborty, Harish Karthikeyan, Adam O'Neill, C. Pandu Rangan:
Forward Security Under Leakage Resilience, Revisited. CANS 2023: 3-27 - [c17]Suvradip Chakraborty, Dennis Hofheinz, Ueli Maurer, Guilherme Rito:
Deniable Authentication When Signing Keys Leak. EUROCRYPT (3) 2023: 69-100 - [c16]Suvradip Chakraborty, Chaya Ganesh, Pratik Sarkar:
Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge. EUROCRYPT (1) 2023: 239-270 - [c15]Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Malgorzata Galazka, Tomasz Lizurej, Krzysztof Pietrzak:
Efficiently Testable Circuits. ITCS 2023: 10:1-10:23 - [c14]Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs:
A Map of Witness Maps: New Definitions and Connections. Public Key Cryptography (2) 2023: 635-662 - [c13]Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Malgorzata Galazka, Tomasz Lizurej, Krzysztof Pietrzak:
Efficiently Testable Circuits Without Conductivity. TCC (3) 2023: 123-152 - [i21]Suvradip Chakraborty, Dennis Hofheinz, Ueli Maurer, Guilherme Rito:
Deniable Authentication when Signing Keys Leak. IACR Cryptol. ePrint Arch. 2023: 213 (2023) - [i20]Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs:
A Map of Witness Maps: New Definitions and Connections. IACR Cryptol. ePrint Arch. 2023: 343 (2023) - [i19]Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Malgorzata Galazka, Tomasz Lizurej, Krzysztof Pietrzak:
Efficiently Testable Circuits without Conductivity. IACR Cryptol. ePrint Arch. 2023: 1795 (2023) - [i18]Suvradip Chakraborty, Lorenzo Magliocco, Bernardo Magri, Daniele Venturi:
Key Exchange in the Post-Snowden Era: UC Secure Subversion-Resilient PAKE. IACR Cryptol. ePrint Arch. 2023: 1827 (2023) - 2022
- [c12]Suvradip Chakraborty, Bernardo Magri, Jesper Buus Nielsen, Daniele Venturi:
Universally Composable Subversion-Resilient Cryptography. EUROCRYPT (1) 2022: 272-302 - [c11]Ran Canetti, Suvradip Chakraborty, Dakshita Khurana, Nishant Kumar, Oxana Poburinnaya, Manoj Prabhakaran:
COA-Secure Obfuscation and Applications. EUROCRYPT (1) 2022: 731-758 - [i17]Suvradip Chakraborty, Bernardo Magri, Jesper Buus Nielsen, Daniele Venturi:
Universally Composable Subversion-Resilient Cryptography. IACR Cryptol. ePrint Arch. 2022: 244 (2022) - [i16]Suvradip Chakraborty, Chaya Ganesh, Pratik Sarkar:
Reverse Firewalls for Oblivious Transfer Extension and Applications to Zero-Knowledge. IACR Cryptol. ePrint Arch. 2022: 1535 (2022) - [i15]Mirza Ahad Baig, Suvradip Chakraborty, Stefan Dziembowski, Malgorzata Galazka, Tomasz Lizurej, Krzysztof Pietrzak:
Efficiently Testable Circuits. IACR Cryptol. ePrint Arch. 2022: 1598 (2022) - [i14]Ran Canetti, Suvradip Chakraborty, Dakshita Khurana, Nishant Kumar, Oxana Poburinnaya, Manoj Prabhakaran:
COA-Secure Obfuscation and Applications. IACR Cryptol. ePrint Arch. 2022: 1781 (2022) - 2021
- [j3]Suvradip Chakraborty, Y. Sreenivasa Rao, C. Pandu Rangan:
Efficient single round attribute-based authenticated key exchange protocol. Int. J. Comput. Math. Comput. Syst. Theory 6(4): 313-336 (2021) - [c10]Suvradip Chakraborty, Chaya Ganesh, Mahak Pancholi, Pratik Sarkar:
Reverse Firewalls for Adaptively Secure MPC Without Setup. ASIACRYPT (2) 2021: 335-364 - [c9]Benedikt Auerbach, Suvradip Chakraborty, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo:
Inverse-Sybil Attacks in Automated Contact Tracing. CT-RSA 2021: 399-421 - [c8]Suvradip Chakraborty, Stefan Dziembowski, Malgorzata Galazka, Tomasz Lizurej, Krzysztof Pietrzak, Michelle Yeo:
Trojan-Resilience Without Cryptography. TCC (2) 2021: 397-428 - [i13]Suvradip Chakraborty, Stefan Dziembowski, Malgorzata Galazka, Tomasz Lizurej, Krzysztof Pietrzak, Michelle Yeo:
Trojan-Resilience without Cryptography. IACR Cryptol. ePrint Arch. 2021: 1224 (2021) - [i12]Suvradip Chakraborty, Chaya Ganesh, Mahak Pancholi, Pratik Sarkar:
Reverse Firewalls for Adaptively Secure MPC without Setup. IACR Cryptol. ePrint Arch. 2021: 1262 (2021) - 2020
- [j2]Suvradip Chakraborty, Janaka Alawatugoda, Chandrasekaran Pandu Rangan:
New approach to practical leakage-resilient public-key cryptography. J. Math. Cryptol. 14(1): 172-201 (2020) - [c7]Suvradip Chakraborty, Stefan Dziembowski, Jesper Buus Nielsen:
Reverse Firewalls for Actively Secure MPCs. CRYPTO (2) 2020: 732-762 - [c6]Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs:
Witness Maps and Applications. Public Key Cryptography (1) 2020: 220-246 - [i11]Suvradip Chakraborty, Manoj Prabhakaran, Daniel Wichs:
Witness Maps and Applications. IACR Cryptol. ePrint Arch. 2020: 90 (2020) - [i10]Benedikt Auerbach, Suvradip Chakraborty, Karen Klein, Guillermo Pascual-Perez, Krzysztof Pietrzak, Michael Walter, Michelle Yeo:
Inverse-Sybil Attacks in Automated Contact Tracing. IACR Cryptol. ePrint Arch. 2020: 670 (2020) - [i9]Suvradip Chakraborty, Harish Karthikeyan, Adam O'Neill, C. Pandu Rangan:
Forward-Security Under Continual Leakage with Deterministic Key Updates. IACR Cryptol. ePrint Arch. 2020: 736 (2020)
2010 – 2019
- 2019
- [c5]Suvradip Chakraborty, C. Pandu Rangan:
Public Key Encryption Resilient to Post-challenge Leakage and Tampering Attacks. CT-RSA 2019: 23-43 - [i8]Suvradip Chakraborty, Stefan Dziembowski, Jesper Buus Nielsen:
Reverse Firewalls for Actively Secure MPCs. IACR Cryptol. ePrint Arch. 2019: 1317 (2019) - 2018
- [i7]Suvradip Chakraborty, C. Pandu Rangan:
Public Key Encryption Resilient to Post-Challenge Leakage and Tampering Attacks. IACR Cryptol. ePrint Arch. 2018: 883 (2018) - 2017
- [c4]Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan:
Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE. ACISP (1) 2017: 343-362 - [c3]Suvradip Chakraborty, Y. Sreenivasa Rao, Chandrasekaran Pandu Rangan:
An Efficient Attribute-Based Authenticated Key Exchange Protocol. CANS 2017: 493-503 - [c2]Suvradip Chakraborty, Janaka Alawatugoda, C. Pandu Rangan:
Leakage-Resilient Non-interactive Key Exchange in the Continuous-Memory Leakage Setting. ProvSec 2017: 167-187 - [i6]Suvradip Chakraborty, Janaka Alawatugoda, C. Pandu Rangan:
New Approach to Practical Leakage-Resilient Public-Key Cryptography. IACR Cryptol. ePrint Arch. 2017: 441 (2017) - [i5]Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan:
Efficient Compilers for After-the-Fact Leakage: from CPA to CCA-2 secure PKE to AKE. IACR Cryptol. ePrint Arch. 2017: 451 (2017) - [i4]Suvradip Chakraborty, Chester Rebeiro, Debdeep Mukhopadhyay, C. Pandu Rangan:
Leakage-Resilient Tweakable Encryption from One-Way Functions. IACR Cryptol. ePrint Arch. 2017: 462 (2017) - 2016
- [j1]Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan:
A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 7(1): 1-22 (2016) - [i3]Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan:
A Pairing-Free, One Round Identity Based Authenticated Key Exchange Protocol Secure Against Memory-Scrapers. IACR Cryptol. ePrint Arch. 2016: 354 (2016) - 2015
- [c1]Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan:
Forward-Secure Authenticated Symmetric Key Exchange Protocol: New Security Model and Secure Construction. ProvSec 2015: 149-166 - [i2]Suvradip Chakraborty, Srinivasan Raghuraman, C. Pandu Rangan:
Efficient, Pairing-Free, One Round Attribute-Based Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2015: 520 (2015) - [i1]Harish Karthikeyan, Suvradip Chakraborty, Kunwar Singh, C. Pandu Rangan:
An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks. IACR Cryptol. ePrint Arch. 2015: 1012 (2015)
Coauthor Index
aka: Chandrasekaran Pandu Rangan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint