Follow
Nirvan Tyagi
Nirvan Tyagi
Verified email at cs.washington.edu - Homepage
Title
Cited by
Cited by
Year
Stadium: A distributed metadata-private messaging system
N Tyagi, Y Gilad, D Leung, M Zaharia, N Zeldovich
Proceedings of the 26th Symposium on Operating Systems Principles, 423-440, 2017
1832017
Proofs for inner pairing products and applications
B Bünz, M Maller, P Mishra, N Tyagi, P Vesely
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
1222021
Asymmetric message franking: content moderation for metadata-private end-to-end encryption
N Tyagi, P Grubbs, J Len, I Miers, T Ristenpart
CRYPTO, 222-250, 2019
492019
VeRSA: Verifiable registries with efficient client audits from RSA authenticated dictionaries
N Tyagi, B Fisch, A Zitek, J Bonneau, S Tessaro
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
43*2022
Energy-efficient algorithms
ED Demaine, J Lynch, GJ Mirano, N Tyagi
Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016
402016
Traceback for end-to-end encrypted messaging
N Tyagi, I Miers, T Ristenpart
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
382019
A fast and simple partially oblivious PRF, with applications
N Tyagi, S Celi, T Ristenpart, N Sullivan, S Tessaro, CA Wood
Annual International Conference on the Theory and Applications of …, 2022
34*2022
Mangrove: A scalable framework for folding-based SNARKs
W Nguyen, T Datta, B Chen, N Tyagi, D Boneh
Annual International Cryptology Conference, 308-344, 2024
232024
Bicorn: An optimistically efficient distributed randomness beacon
K Choi, A Arun, N Tyagi, J Bonneau
International Conference on Financial Cryptography and Data Security, 235-251, 2023
212023
BurnBox: Self-Revocable Encryption in a World Of Compelled Access
N Tyagi, MH Mughees, T Ristenpart, I Miers
27th USENIX Security Symposium (USENIX Security 18), 445-461, 2018
172018
Handling adaptive compromise for practical encryption schemes
J Jaeger, N Tyagi
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
162020
Riggs: Decentralized sealed-bid auctions
N Tyagi, A Arun, C Freitag, R Wahby, J Bonneau, D Mazières
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
152023
Toward an energy efficient language and compiler for (partially) reversible algorithms
N Tyagi, J Lynch, ED Demaine
International Conference on Reversible Computation, 121-136, 2016
92016
Muxproofs: Succinct arguments for machine computation from tuple lookups
Z Di, L Xia, W Nguyen, N Tyagi
Cryptology ePrint Archive, 2023
82023
Orca: Blocklisting in {Sender-Anonymous} Messaging
N Tyagi, J Len, I Miers, T Ristenpart
31st USENIX Security Symposium (USENIX Security 22), 2299-2316, 2022
72022
MuxProofs: Succinct Arguments for Machine Computation from Vector Lookups
Z Di, L Xia, W Nguyen, N Tyagi
International Conference on the Theory and Application of Cryptology and …, 2025
2025
Private Hierarchical Governance for Encrypted Messaging
A Namavari, B Wang, S Menda, B Nassi, N Tyagi, J Grimmelmann, ...
2024 IEEE Symposium on Security and Privacy (SP), 255-255, 2024
2024
Privacy-Preserving Accountability in Online Messaging
N Tyagi
Cornell University, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–18