Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Vinod Vaikuntanathan
Search web for home page
Program Committees
1
2013
PKC
pc
2
2012
Eurocrypt
pc
3
2012
Crypto
pc
4
2012
TCC
pc
5
2010
TCC
pc
6
2010
Crypto
pc
7
2010
Asiacrypt
pc
Publications
year
title
booktitle
pages
1
2012
Functional Encryption for Threshold Functions (or Fuzzy IBE) from Lattices
pkc
280-297
2
2012
Efficient Password Authenticated Key Exchange via Oblivious Transfer
pkc
449-466
3
2012
How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption
tcc
422-439
4
2012
Functional Re-encryption and Collusion-Resistant Obfuscation
tcc
404-421
5
2012
Multiparty Computation with Low Communication, Computation and Interaction via Threshold FHE
eurocrypt
483-501
6
2012
Functional Encryption with Bounded Collusions via Multi-party Computation
crypto
162-179
7
2011
Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages
crypto
501
8
2011
Functional Encryption for Inner Product Predicates from Learning with Errors
asiacrypt
21-40
9
2011
Securely Obfuscating Re-Encryption
jofc
694-719
10
2011
New Developments in Leakage-Resilient Cryptography
pkc
283
11
2011
Round-Optimal Password-Based Authenticated Key Exchange
tcc
293
12
2010
i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
eprint
online
13
2010
A Group Signature Scheme from Lattice Assumptions
asiacrypt
395-412
14
2010
A Simple BGN-type Cryptosystem from LWE
eprint
online
15
2010
Public-Key Encryption Schemes with Auxiliary Inputs
tcc
361-381
16
2010
i
-Hop Homomorphic Encryption and Rerandomizable Yao Circuits
crypto
155-172
17
2010
Cryptography Resilient to Continual Memory Leakage
eprint
online
18
2010
A Simple BGN-Type Cryptosystem from LWE
eurocrypt
506-522
19
2010
Protecting Circuits from Leakage: the Computationally-Bounded and Noisy Cases
eurocrypt
135-156
20
2010
Fully Homomorphic Encryption over the Integers
eurocrypt
24-43
21
2010
One-Round Password-Based Authenticated Key Exchange
eprint
online
22
2009
Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices
asiacrypt
636-652
23
2009
Signature Schemes with Bounded Leakage Resilience
asiacrypt
703-720
24
2009
How Efficient Can Memory Checking Be?
tcc
503-520
25
2009
Simultaneous Hardcore Bits and Cryptography against Memory Attacks
tcc
474-495
26
2009
Weak Verifiable Random Functions
tcc
558-576
27
2008
A Framework for Efficient and Composable Oblivious Transfer
crypto
554-571
28
2008
Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems
crypto
536-553
29
2008
Adaptive One-Way Functions and Applications
crypto
57-74
30
2007
Relations Among Notions of Non-malleability for Encryption
asiacrypt
519-535
31
2007
Bounded CCA2-Secure Encryption
asiacrypt
502-518
32
2007
A Framework for Efficient and Composable Oblivious Transfer
eprint
online
33
2007
Secure Computation from Random Error Correcting Codes
eurocrypt
291-310
34
2007
Securely Obfuscating Re-encryption
tcc
233-252
35
2007
Trapdoors for Hard Lattices and New Cryptographic Constructions
eprint
online
36
2006
Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One
crypto
online
Coauthors of Vinod Vaikuntanathan
Shweta Agrawal
Adi Akavia
Gilad Asharov
Xavier Boyen
Zvika Brakerski
Ran Canetti
Nishanth Chandran
Melissa Chase
Hao Chen
Ronald Cramer
Dana Dachman-Soled
Marten van Dijk
Yevgeniy Dodis
Cynthia Dwork
Sebastian Faust
David Freeman
Craig Gentry
Shafi Goldwasser
Sergey Gorbunov
S. Dov Gordon
Robbert de Haan
Shai Halevi
Goichiro Hanaoka
Dennis Hofheinz
Susan Hohenberger
Hideki Imai
Abhishek Jain
Yael Tauman Kalai
Jonathan Katz
Eike Kiltz
Adriana López-Alt
Moni Naor
Omkant Pandey
Bryan Parno
Rafael Pass
Chris Peikert
Tal Rabin
Mariana Raykova
Leonid Reyzin
Guy N. Rothblum
Abhi Shelat
Eran Tromer
Panagiotis Voulgaris
Brent Waters
Hoeteck Wee
Daniel Wichs