default search action
Shashank Agrawal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c30]Shashank Agrawal, Estuardo Alpirez Bock, Yilei Chen, Gaven J. Watson:
White-Box Cryptography with Global Device Binding from Message-Recoverable Signatures and Token-Based Obfuscation. COSADE 2023: 241-261 - [c29]Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran, Rajeev Raghunath, Jayesh Singla:
CASE: A New Frontier in Public-Key Authenticated Encryption. TCC (2) 2023: 189-219 - [i32]Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran, Rajeev Raghunath, Jayesh Singla:
CASE: A New Frontier in Public-Key Authenticated Encryption. IACR Cryptol. ePrint Arch. 2023: 1786 (2023) - 2022
- [j6]Gunjan Rajput, Shashank Agrawal, Gopal Raut, Santosh Kumar Vishvakarma:
An accurate and noninvasive skin cancer screening based on imaging technique. Int. J. Imaging Syst. Technol. 32(1): 354-368 (2022) - [j5]Gunjan Rajput, Shashank Agrawal, Kunika Naresh Biyani, Santosh Kumar Vishvakarma:
Early breast cancer diagnosis using cogent activation function-based deep learning implementation on screened mammograms. Int. J. Imaging Syst. Technol. 32(4): 1101-1118 (2022) - [c28]Shashank Agrawal, Wei Dai, Atul Luykx, Pratyay Mukherjee, Peter Rindal:
ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model. INDOCRYPT 2022: 26-51 - [i31]Shashank Agrawal:
Secure Plot Transfer for the Chia Blockchain. IACR Cryptol. ePrint Arch. 2022: 871 (2022) - [i30]Shashank Agrawal, Wei Dai, Atul Luykx, Pratyay Mukherjee, Peter Rindal:
ParaDiSE: Efficient Threshold Authenticated Encryption in Fully Malicious Model. IACR Cryptol. ePrint Arch. 2022: 1449 (2022) - [i29]Mastooreh Salajegheh, Shashank Agrawal, Maliheh Shirvanian, Mihai Christodorescu, Payman Mohassel:
CoRA: Collaborative Risk-Aware Authentication. IACR Cryptol. ePrint Arch. 2022: 1685 (2022) - 2021
- [c27]Maliheh Shirvanian, Shashank Agrawal:
2D-2FA: A New Dimension in Two-Factor Authentication. ACSAC 2021: 482-496 - [c26]Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Pratyay Mukherjee, Sikhar Patranabis:
BETA: Biometric-Enabled Threshold Authentication. Public Key Cryptography (2) 2021: 290-318 - [i28]Maliheh Shirvanian, Shashank Agrawal:
2D-2FA: A New Dimension in Two-Factor Authentication. CoRR abs/2110.15872 (2021) - [i27]Shashank Agrawal, Estuardo Alpirez Bock, Yilei Chen, Gaven J. Watson:
White-box Cryptography with Device Binding from Token-based Obfuscation and more. IACR Cryptol. ePrint Arch. 2021: 767 (2021) - 2020
- [c25]Shashank Agrawal, Srinivasan Raghuraman:
KVaC: Key-Value Commitments for Blockchains and Beyond. ASIACRYPT (3) 2020: 839-869 - [c24]Shashank Agrawal, Saikrishna Badrinarayanan, Pratyay Mukherjee, Peter Rindal:
Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching. CCS 2020: 1351-1370 - [c23]Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, Dan Boneh:
Zether: Towards Privacy in a Smart Contract World. Financial Cryptography 2020: 423-443 - [i26]Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Pratyay Mukherjee, Sikhar Patranabis:
BETA: Biometric Enabled Threshold Authentication. IACR Cryptol. ePrint Arch. 2020: 679 (2020) - [i25]Shashank Agrawal, Srinivasan Raghuraman:
KVaC: Key-Value Commitments for Blockchains and Beyond. IACR Cryptol. ePrint Arch. 2020: 1161 (2020) - [i24]Shashank Agrawal, Saikrishna Badrinarayanan, Pratyay Mukherjee, Peter Rindal:
Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching. IACR Cryptol. ePrint Arch. 2020: 1363 (2020)
2010 – 2019
- 2019
- [i23]Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, Dan Boneh:
Zether: Towards Privacy in a Smart Contract World. IACR Cryptol. ePrint Arch. 2019: 191 (2019) - 2018
- [c22]Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal:
DiSE: Distributed Symmetric-key Encryption. CCS 2018: 1993-2010 - [c21]Shashank Agrawal, Peihan Miao, Payman Mohassel, Pratyay Mukherjee:
PASTA: PASsword-based Threshold Authentication. CCS 2018: 2042-2059 - [c20]Shashank Agrawal, Chaya Ganesh, Payman Mohassel:
Non-Interactive Zero-Knowledge Proofs for Composite Statements. CRYPTO (3) 2018: 643-673 - [c19]Shashank Agrawal, Venkata Koppula, Brent Waters:
Impossibility of Simulation Secure Functional Encryption Even with Random Oracles. TCC (1) 2018: 659-688 - [i22]Shashank Agrawal, Chaya Ganesh, Payman Mohassel:
Non-Interactive Zero-Knowledge Proofs for Composite Statements. IACR Cryptol. ePrint Arch. 2018: 557 (2018) - [i21]Shashank Agrawal, Payman Mohassel, Pratyay Mukherjee, Peter Rindal:
DiSE: Distributed Symmetric-key Encryption. IACR Cryptol. ePrint Arch. 2018: 727 (2018) - [i20]Shashank Agrawal, Peihan Miao, Payman Mohassel, Pratyay Mukherjee:
PASTA: PASsword-based Threshold Authentication. IACR Cryptol. ePrint Arch. 2018: 885 (2018) - 2017
- [c18]Shashank Agrawal, Melissa Chase:
FAME: Fast Attribute-based Message Encryption. CCS 2017: 665-682 - [c17]Shashank Agrawal, David J. Wu:
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions. EUROCRYPT (2) 2017: 30-61 - [c16]Shashank Agrawal, Melissa Chase:
Simplifying Design and Analysis of Complex Predicate Encryption Schemes. EUROCRYPT (1) 2017: 627-656 - [i19]Shashank Agrawal, Melissa Chase:
Simplifying Design and Analysis of Complex Predicate Encryption Schemes. IACR Cryptol. ePrint Arch. 2017: 233 (2017) - [i18]Shashank Agrawal, Melissa Chase:
FAME: Fast Attribute-based Message Encryption. IACR Cryptol. ePrint Arch. 2017: 807 (2017) - 2016
- [c15]Shashank Agrawal, Melissa Chase:
A Study of Pair Encodings: Predicate Encryption in Prime Order Groups. TCC (A2) 2016: 259-288 - [c14]Shashank Agrawal, Manoj Prabhakaran, Ching-Hua Yu:
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents. TCC (B2) 2016: 269-296 - [c13]Divesh Aggarwal, Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Optimal Computational Split-state Non-malleable Codes. TCC (A2) 2016: 393-417 - [i17]Shashank Agrawal, David J. Wu:
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions. IACR Cryptol. ePrint Arch. 2016: 482 (2016) - [i16]Shashank Agrawal, Manoj Prabhakaran, Ching-Hua Yu:
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents. IACR Cryptol. ePrint Arch. 2016: 819 (2016) - [i15]Shashank Agrawal, Venkata Koppula, Brent Waters:
Impossibility of Simulation Secure Functional Encryption Even with Random Oracles. IACR Cryptol. ePrint Arch. 2016: 959 (2016) - 2015
- [b1]Shashank Agrawal:
Cryptographic agents. University of Illinois Urbana-Champaign, USA, 2015 - [j4]Shashank Agrawal:
Alice and Bob in the new world. XRDS 21(3): 8-9 (2015) - [j3]Shashank Agrawal, Billy Rathje:
Kristin Lauter on Cryptography and Mathematics. XRDS 21(3): 20-22 (2015) - [c12]Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations. CRYPTO (1) 2015: 538-557 - [c11]Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran:
Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data. EUROCRYPT (2) 2015: 501-531 - [c10]Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, Amit Sahai:
On the Practical Security of Inner Product Functional Encryption. Public Key Cryptography 2015: 777-798 - [c9]Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations. TCC (1) 2015: 375-397 - [i14]Shashank Agrawal, Melissa Chase:
A study of Pair Encodings: Predicate Encryption in prime order groups. IACR Cryptol. ePrint Arch. 2015: 413 (2015) - [i13]Divesh Aggarwal, Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Optimal Computational Split-state Non-malleable Codes. IACR Cryptol. ePrint Arch. 2015: 1063 (2015) - 2014
- [c8]Muhammad Naveed, Shashank Agrawal, Manoj Prabhakaran, XiaoFeng Wang, Erman Ayday, Jean-Pierre Hubaux, Carl A. Gunter:
Controlled Functional Encryption. CCS 2014: 1280-1291 - [c7]Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran, Alon Rosen:
Lower Bounds in the Hardware Token Model. TCC 2014: 663-687 - [i12]Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Explicit Non-Malleable Codes Resistant to Permutations. Electron. Colloquium Comput. Complex. TR14 (2014) - [i11]Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Explicit Non-Malleable Codes Resistant to Permutations. IACR Cryptol. ePrint Arch. 2014: 316 (2014) - [i10]Shashank Agrawal, Shweta Agrawal, Manoj Prabhakaran:
Towards a Unified Theory of Cryptographic Agents. IACR Cryptol. ePrint Arch. 2014: 480 (2014) - [i9]Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Explicit Non-malleable Codes Resistant to Permutations and Perturbations. IACR Cryptol. ePrint Arch. 2014: 841 (2014) - [i8]Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering and Permutations. IACR Cryptol. ePrint Arch. 2014: 842 (2014) - 2013
- [j2]Abhinav Mehta, Shashank Agrawal, Kannan Srinathan:
Interplay between (im)perfectness, synchrony and connectivity: The case of reliable message transmission. Theor. Comput. Sci. 496: 2-16 (2013) - [c6]Shashank Agrawal, Chandra Sekhar Sekhar, S. Mishra:
Control of single-phase grid connected PV power plant for real as well as reactive power feeding. CCA 2013: 667-672 - [c5]Shashank Agrawal, Manoj Prabhakaran:
On Fair Exchange, Fair Coins and Fair Sampling. CRYPTO (1) 2013: 259-276 - [i7]Shashank Agrawal, Manoj Prabhakaran:
On Fair Exchange, Fair Coins and Fair Sampling. IACR Cryptol. ePrint Arch. 2013: 442 (2013) - [i6]Shashank Agrawal, Shweta Agrawal, Saikrishna Badrinarayanan, Abishek Kumarasubramanian, Manoj Prabhakaran, Amit Sahai:
Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results. IACR Cryptol. ePrint Arch. 2013: 744 (2013) - [i5]Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran, Alon Rosen:
Lower Bounds in the Hardware Token Model. IACR Cryptol. ePrint Arch. 2013: 827 (2013) - 2012
- [j1]Shashank Agrawal:
Verifiable secret sharing in a total of three rounds. Inf. Process. Lett. 112(22): 856-859 (2012) - [c4]Abhinav Mehta, Shashank Agrawal, Kannan Srinathan:
Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission. ICDCN 2012: 138-152 - 2011
- [c3]Manan Nayak, Shashank Agrawal, Kannan Srinathan:
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks. ICITS 2011: 32-51 - [c2]Shashank Agrawal, Abhinav Mehta, Kannan Srinathan:
Secure Message Transmission in Asynchronous Directed Graphs. INDOCRYPT 2011: 359-378 - [i4]Shashank Agrawal, Abhinav Mehta, Kannan Srinathan:
Secure Message Transmission In Asynchronous Directed Networks. IACR Cryptol. ePrint Arch. 2011: 13 (2011) - [i3]Shashank Agrawal, Abhinav Mehta, Kannan Srinathan:
Unconditionally Reliable Message Transmission in Directed Neighbour Networks. IACR Cryptol. ePrint Arch. 2011: 14 (2011) - [i2]Manan Nayak, Shashank Agrawal, Kannan Srinathan:
Minimal Connectivity for Unconditionally Secure Message Transmission in Synchronous Directed Networks. IACR Cryptol. ePrint Arch. 2011: 320 (2011) - 2010
- [c1]Abhinav Mehta, Shashank Agrawal, Kannan Srinathan:
Brief Announcement: Synchronous Las Vegas URMT Iff Asynchronous Monte Carlo URMT. DISC 2010: 201-203 - [i1]Abhinav Mehta, Shashank Agrawal, Kannan Srinathan:
Interplay between (Im)perfectness, Synchrony and Connectivity: The Case of Reliable Message Transmission. IACR Cryptol. ePrint Arch. 2010: 392 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-16 19:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint