Correlated-input secure hash functions V Goyal, A O’Neill, V Rao Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011 | 129 | 2011 |
Round optimal blind signatures S Garg, V Rao, A Sahai, D Schröder, D Unruh Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011 | 74 | 2011 |
Adaptively secure, universally composable, multiparty computation in constant rounds D Dachman-Soled, J Katz, V Rao Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015 | 66 | 2015 |
Adaptive security of constrained PRFs G Fuchsbauer, M Konstantinov, K Pietrzak, V Rao Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014 | 52 | 2014 |
Standard security does not imply indistinguishability under selective opening D Hofheinz, V Rao, D Wichs Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016 | 50 | 2016 |
Method for differentially private aggregation in a star topology under a realistic adversarial model S Rane, V Bindschaedler, AE Brito, E Uzun, V Rao US Patent 10,223,547, 2019 | 38 | 2019 |
Achieving differential privacy in secure multiparty data aggregation protocols on star networks V Bindschaedler, S Rane, AE Brito, V Rao, E Uzun Proceedings of the Seventh ACM on Conference on Data and Application …, 2017 | 35 | 2017 |
Revisiting lower and upper bounds for selective decommitments R Ostrovsky, V Rao, A Scafuro, I Visconti Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013 | 26 | 2013 |
Adaptively secure multi-party computation from LWE (via equivocal FHE) I Damgård, A Polychroniadou, V Rao Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016 | 21 | 2016 |
Multi-party key exchange for unbounded parties from indistinguishability obfuscation D Khurana, V Rao, A Sahai International Conference on the Theory and Application of Cryptology and …, 2015 | 17 | 2015 |
Adaptive multiparty non-interactive key exchange without setup in the standard model V Rao Cryptology ePrint Archive, 2014 | 11 | 2014 |
Microspring structure for hardware trusted platform module WB Jackson, V Rao, EM Chow US Patent 11,289,443, 2022 | 10 | 2022 |
Secure two-party feature selection V Rao, Y Long, H Eldardiry, S Rane, R Rossi, F Torres arXiv preprint arXiv:1901.00832, 2019 | 10 | 2019 |
Statistical concurrent non-malleable zero knowledge C Orlandi, R Ostrovsky, V Rao, A Sahai, I Visconti Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014 …, 2014 | 10 | 2014 |
On selective-opening attacks against encryption schemes R Ostrovsky, V Rao, I Visconti Security and Cryptography for Networks: 9th International Conference, SCN …, 2014 | 10 | 2014 |
Computer-implemented system and method for protecting sensitive data via data re-encryption V Rao, S Rane, E Uzun, AE Brito US Patent 10,277,563, 2019 | 9 | 2019 |
Adaptively secure uc constant round multi-party computation I Damgård, A Polychroniadou, V Rao Cryptology ePrint Archive, Report 2014/830, 2014 | 5 | 2014 |
On the (in) security of Fischlin’s paradigm P Ananth, R Bhaskar, V Goyal, V Rao Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013 | 5 | 2013 |
System and architecture for analytics on encrypted databases S Rane, V Bindschaedler, AE Brito, E Uzun, V Rao US Patent 10,846,423, 2020 | 4 | 2020 |
System and architecture for supporting analytics on encrypted databases S Rane, V Bindschaedler, AE Brito, E Uzun, V Rao US Patent 10,783,263, 2020 | 3 | 2020 |