Подписаться
Arnab Roy
Arnab Roy
Research Scientist, Mysten Labs
Подтвержден адрес электронной почты в домене cs.stanford.edu
Название
Процитировано
Процитировано
Год
Protocol composition logic (PCL)
A Datta, A Derek, JC Mitchell, A Roy
Electronic Notes in Theoretical Computer Science 172, 311-358, 2007
3062007
Shorter quasi-adaptive NIZK proofs for linear subspaces
CS Jutla, A Roy
Journal of Cryptology 30 (4), 1116-1156, 2017
2132017
Function-hiding inner product encryption is practical
S Kim, K Lewi, A Mandal, H Montgomery, A Roy, DJ Wu
International Conference on Security and Cryptography for Networks, 544-562, 2018
2052018
NiST big data interoperability framework: Volume 2, big data taxonomies
WL Chang, N Grady
Wo L. Chang, Nancy Grady, 2019
1292019
Universally composable security analysis of OAuth v2. 0
S Chari, C Jutla, A Roy
Cryptology ePrint Archive, 2011
902011
Switching lemma for bilinear tests and constant-size NIZK proofs for linear subspaces
CS Jutla, A Roy
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
802014
Secrecy analysis in protocol composition logic
A Roy, A Datta, A Derek, JC Mitchell, JP Seifert
Advances in Computer Science-ASIAN 2006. Secure Software and Related Issues …, 2007
662007
NIST Big Data Public Working Group Definitions and Taxonomies Subgroup In: Framework: Definitions
NBD Interoperability
NIST Special Publication, 1500-1, 2015
54*2015
Top ten big data security and privacy challenges
AC Mora, Y Chen, A Fuchs, A Lane, R Lu, P Manadhata
Cloud Security Alliance (CSA) 140, 2012
47*2012
Nist big data interoperability framework: Volume 6, reference architecture
WL Chang, D Boyd, O Levin
Wo L. Chang, David Boyd, Orit Levin, 2019
382019
Privacy preserving set-based biometric authentication
J Hartloff, A Mandal, A Roy
US Patent 9,967,101, 2018
382018
Dual-system simulation-soundness with applications to UC-PAKE and more
CS Jutla, A Roy
Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2015
372015
Relatively-sound NIZKs and password-based key-exchange
C Jutla, A Roy
International Workshop on Public Key Cryptography, 485-503, 2012
372012
Relational encryption
R Kamakari, T Shimoyama, H Tsuda, Y Yaginuma, A Mandal, A Roy, ...
US Patent 9,660,991, 2017
362017
Compressed quadratization of higher order binary optimization problems
A Mandal, A Roy, S Upadhyay, H Ushijima-Mwesigwa
Proceedings of the 17th ACM International Conference on Computing Frontiers …, 2020
352020
Improved (almost) tightly-secure simulation-sound QA-NIZK with applications
M Abe, CS Jutla, M Ohkubo, A Roy
International Conference on the Theory and Application of Cryptology and …, 2018
352018
Big data: Challenges, practices and technologies: NIST big data public working group workshop at IEEE big data 2014
NW Grady, M Underwood, A Roy, WL Chang
2014 IEEE International Conference on Big Data (Big Data), 11-15, 2014
352014
Formal proofs of cryptographic security of diffie-hellman-based protocols
A Roy, A Datta, JC Mitchell
International Symposium on Trustworthy Global Computing, 312-329, 2007
352007
Improved structure preserving signatures under standard bilinear assumptions
CS Jutla, A Roy
IACR International Workshop on Public Key Cryptography, 183-209, 2017
342017
Big data taxonomy
P Murthy, A Bharadwaj, PA Subrahmanyam, A Roy, S Rajan
Big Data Working Group, Cloud Security Alliance, 9-29, 2014
34*2014
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20