What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Aniket Kate
Google Scholar
75
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Mixnets on a Tightrope: Quantifying the Leakage of Mix Networks Using a Provably Optimal Heuristic Adversary.
Sebastian Meiser
Debajyoti Das
Moritz Kirschte
Esfandiar Mohammadi
Aniket Kate
2025
conf/sp
Sailfish: Towards Improving the Latency of DAG-Based BFT.
Nibesh Shrestha
Rohan Shrothrium
Aniket Kate
Kartik Nayak
2025
conf/sp
Cauchyproofs: Batch-Updatable Vector Commitment with Easy Aggregation and Application to Stateless Blockchains.
Zhongtang Luo
Yanxue Jia
Alejandra Victoria Ospina Gracia
Aniket Kate
2025
conf/sp
Vitārit: Paying for Threshold Services on Bitcoin and Friends.
Sri Aravinda Krishnan Thyagarajan
Easwar Vivek Mangipudi
Lucjan Hanzlik
Aniket Kate
Pratyay Mukherjee
2025
conf/eurocrypt
Disincentivize Collusion in Verifiable Secret Sharing.
Tiantian Gong
Aniket Kate
Hemanta K. Maji
Hai H. Nguyen
2025
conf/crypto
Computationally Efficient Asynchronous MPC with Linear Communication and Low Additive Overhead.
Akhil Bandarupalli
Xiaoyu Ji
Aniket Kate
Chen-Da Liu-Zhang
Yifan Song
2025
conf/uss
Recover from Excessive Faults in Partially-Synchronous BFT SMR.
Tiantian Gong
Gustavo Franco Camilo
Kartik Nayak
Andrew Lewis-Pye
Aniket Kate
2024
journals/cic
Synchronous Distributed Key Generation without Broadcasts.
Nibesh Shrestha
Adithya Bhat
Aniket Kate
Kartik Nayak
2024
conf/ccs
Threshold Cryptography.
Akhil Bandarupalli
Adithya Bhat
Saurabh Bagchi
Aniket Kate
Michael K. Reiter
2024
conf/ccs
HomeRun: High-efficiency Oblivious Message Retrieval, Unrestricted.
Yanxue Jia
Varun Madathil
Aniket Kate
2024
conf/ccs
Non-interactive VSS using Class Groups and Application to DKG.
Aniket Kate
Easwar Vivek Mangipudi
Pratyay Mukherjee
Hamza Saleem
Sri Aravinda Krishnan Thyagarajan
2024
conf/sp
Attacking and Improving the Tor Directory Protocol.
Zhongtang Luo
Adithya Bhat
Kartik Nayak
Aniket Kate
2024
conf/sp
More is Merrier: Relax the Non-Collusion Assumption in Multi-Server PIR.
Tiantian Gong
Ryan Henry
Alexandros Psomas
Aniket Kate
2024
conf/ndss
Front-running Attack in Sharded Blockchains and Fair Cross-shard Consensus.
Jianting Zhang
Wuhui Chen
Sifu Luo
Tiantian Gong
Zicong Hong
Aniket Kate
2024
conf/dsn
(Re)-envisioning Approximate Agreement for Distributed Cryptography and Oracles.
Akhil Bandarupalli
Saurabh Bagchi
Aniket Kate
2024
conf/dsn
Delphi: Efficient Asynchronous Approximate Agreement for Distributed Oracles.
Akhil Bandarupalli
Adithya Bhat
Saurabh Bagchi
Aniket Kate
Chen-Da Liu-Zhang
Michael K. Reiter
2023
journals/popets
RPM: Robust Anonymity at Scale.
Donghang Lu
Aniket Kate
2023
conf/ccs
FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains.
Aniket Kate
Easwar Vivek Mangipudi
Siva Maradana
Pratyay Mukherjee
2023
conf/ccs
Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets.
Easwar Vivek Mangipudi
Udit Desai
Mohsen Minaei
Mainack Mondal
Aniket Kate
2023
conf/fc
The Unique Chain Rule and Its Applications.
Adithya Bhat
Akhil Bandarupalli
Saurabh Bagchi
Aniket Kate
Michael K. Reiter
2023
conf/eurosp
SIM: Secure Interval Membership Testing and Applications to Secure Comparison.
Albert Yu
Donghang Lu
Aniket Kate
Hemanta K. Maji
2023
conf/ndss
Breaking and Fixing Virtual Channels: Domino Attack and Donner.
Lukas Aumayr
Pedro Moreno-Sanchez
Aniket Kate
Matteo Maffei
2023
conf/ndss
OptRand: Optimistically Responsive Reconfigurable Distributed Randomness.
Adithya Bhat
Nibesh Shrestha
Aniket Kate
Kartik Nayak
2022
journals/popets
Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications.
Donghang Lu
Albert Yu
Aniket Kate
Hemanta K. Maji
2022
journals/popets
OrgAn: Organizational Anonymity with Low Latency.
Debajyoti Das
Easwar Vivek Mangipudi
Aniket Kate
2022
conf/uss
Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures.
Mohsen Minaei
Mainack Mondal
Aniket Kate
2022
conf/fc
Towards Overcoming the Undercutting Problem.
Tiantian Gong
Mohsen Minaei
Wenhai Sun
Aniket Kate
2022
conf/ndss
hbACSS: How to Robustly Share Many Secrets.
Thomas Yurek
Licheng Luo
Jaiden Fairoze
Aniket Kate
Andrew Miller
2021
conf/ccs
OpenSquare: Decentralized Repeated Modular Squaring Service.
Sri Aravinda Krishnan Thyagarajan
Tiantian Gong
Adithya Bhat
Aniket Kate
Dominique Schröder
2021
conf/ccs
RandPiper - Reconfiguration-Friendly Random Beacons with Quadratic Communication.
Adithya Bhat
Nibesh Shrestha
Zhongtang Luo
Aniket Kate
Kartik Nayak
2021
conf/uss
Blitz: Secure Multi-Hop Payments Without Two-Phase Commits.
Lukas Aumayr
Pedro Moreno-Sanchez
Aniket Kate
Matteo Maffei
2021
conf/fc
Reparo: Publicly Verifiable Layer to Repair Blockchains.
Sri Aravinda Krishnan Thyagarajan
Adithya Bhat
Bernardo Magri
Daniel Tschudi
Aniket Kate
2021
conf/ndss
Deceptive Deletions for Protecting Withdrawn Posts on Social Media Platforms.
Mohsen Minaei
S. Chandra Mouli
Mainack Mondal
Bruno Ribeiro
Aniket Kate
2020
journals/popets
MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies.
Mohsen Minaei
Pedro Moreno-Sanchez
Aniket Kate
2020
journals/popets
Comprehensive Anonymity Trilemma: User Coordination is not enough.
Debajyoti Das
Sebastian Meiser
Esfandiar Mohammadi
Aniket Kate
2020
journals/popets
A Tale of Two Trees: One Writes, and Other Reads.
Duc Viet Le
Lizzy Tengana Hurtado
Adil Ahmad
Mohsen Minaei
Byoungyoung Lee
Aniket Kate
2020
conf/ccs
Verifiable Timed Signatures Made Practical.
Sri Aravinda Krishnan Thyagarajan
Adithya Bhat
Giulio Malavolta
Nico Döttling
Aniket Kate
Dominique Schröder
2020
conf/fc
DLSAG: Non-interactive Refund Transactions for Interoperable Payment Channels in Monero.
Pedro Moreno-Sanchez
Arthur Blue
Duc Viet Le
Sarang Noether
Brandon Goodell
Aniket Kate
2020
conf/ndss
Finding Safety in Numbers with Secure Allegation Escrows.
Venkat Arun
Aniket Kate
Deepak Garg
Peter Druschel
Bobby Bhattacharjee
2019
journals/popets
Lethe: Conceal Content Deletion from Persistent Observers.
Mohsen Minaei
Mainack Mondal
Patrick Loiseau
Krishna P. Gummadi
Aniket Kate
2019
conf/ccs
HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication.
Donghang Lu
Thomas Yurek
Samarth Kulshreshtha
Rahul Govind
Aniket Kate
Andrew Miller
2019
conf/eurosp
Towards Automatically Penalizing Multimedia Breaches (Extended Abstract).
Easwar Vivek Mangipudi
Krutarth Rao
Jeremy Clark
Aniket Kate
2019
conf/esorics
Flexible Signatures: Making Authentication Suitable for Real-Time Environments.
Duc Viet Le
Mahimna Kelkar
Aniket Kate
2019
conf/ndss
Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification.
Sze Yiu Chau
Moosa Yahyazadeh
Omar Chowdhury
Aniket Kate
Ninghui Li
2019
conf/ndss
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability.
Giulio Malavolta
Pedro Moreno-Sanchez
Clara Schneidewind
Aniket Kate
Matteo Maffei
2019
conf/pkc
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup.
Michael Backes
Lucjan Hanzlik
Amir Herzberg
Aniket Kate
Ivan Pryvalov
2018
journals/compsec
ClearChart: Ensuring integrity of consumer ratings in online marketplaces.
Pedro Moreno-Sanchez
Uzair Mahmood
Aniket Kate
2018
conf/sp
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two.
Debajyoti Das
Sebastian Meiser
Esfandiar Mohammadi
Aniket Kate
2018
conf/ndss
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions.
Stefanie Roos
Pedro Moreno-Sanchez
Aniket Kate
Ian Goldberg
2018
conf/acsac
Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps.
Sze Yiu Chau
Bincheng Wang
Jianxiong Wang
Omar Chowdhury
Aniket Kate
Ninghui Li
2017
journals/popets
PathShuffle: Credit Mixing and Anonymous Payments for Ripple.
Pedro Moreno-Sanchez
Tim Ruffing
Aniket Kate
2017
conf/ccs
Concurrency and Privacy with Payment-Channel Networks.
Giulio Malavolta
Pedro Moreno-Sanchez
Aniket Kate
Matteo Maffei
Srivatsan Ravi
2017
conf/sp
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations.
Sze Yiu Chau
Omar Chowdhury
Md. Endadul Hoque
Huangyi Ge
Aniket Kate
Cristina Nita-Rotaru
Ninghui Li
2017
conf/acns
cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations.
David Chaum
Debajyoti Das
Farid Javani
Aniket Kate
Anna Krasnova
Joeri de Ruiter
Alan T. Sherman
2017
conf/ndss
P2P Mixing and Unlinkable Bitcoin Transactions.
Tim Ruffing
Pedro Moreno-Sanchez
Aniket Kate
2017
conf/ndss
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks.
Giulio Malavolta
Pedro Moreno-Sanchez
Aniket Kate
Matteo Maffei
2016
journals/popets
Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network.
Pedro Moreno-Sanchez
Muhammad Bilal Zafar
Aniket Kate
2016
conf/ccs
Introduction to Credit Networks: Security, Privacy, and Applications.
Aniket Kate
2016
conf/soups
Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data.
Mainack Mondal
Johnnatan Messias
Saptarshi Ghosh
Krishna P. Gummadi
Aniket Kate
2016
conf/esorics
Anonymous RAM.
Michael Backes
Amir Herzberg
Aniket Kate
Ivan Pryvalov
2015
conf/ccs
Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins.
Tim Ruffing
Aniket Kate
Dominique Schröder
2015
conf/acns
Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources.
Michael Backes
Aniket Kate
Sebastian Meiser
Tim Ruffing
2015
conf/acns
Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget).
Satrajit Ghosh
Aniket Kate
2015
conf/ndss
Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces.
Pedro Moreno-Sanchez
Aniket Kate
Matteo Maffei
Kim Pecina
2014
conf/ccs
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection.
Michael Backes
Aniket Kate
Sebastian Meiser
Esfandiar Mohammadi
2014
conf/acns
BackRef: Accountability in Anonymous Communication Networks.
Michael Backes
Jeremy Clark
Aniket Kate
Milivoj Simeonovski
Peter Druschel
2014
conf/esorics
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin.
Tim Ruffing
Pedro Moreno-Sanchez
Aniket Kate
2014
conf/acsac
Differentially private data aggregation with optimal utility.
Fabienne Eigner
Matteo Maffei
Ivan Pryvalov
Francesca Pampaloni
Aniket Kate
2013
conf/ccs
Identity-based steganography and its applications to censorship resistance.
Tim Ruffing
Jonas Schneider
Aniket Kate
2013
conf/ctrsa
Asynchronous Computational VSS with Reduced Communication Complexity.
Michael Backes
Amit Datta
Aniket Kate
2012
conf/ccs
Adding query privacy to robust DHTs.
Michael Backes
Ian Goldberg
Aniket Kate
Tomas Toft
2012
conf/sp
ObliviAd: Provably Secure and Practical Online Behavioral Advertising.
Michael Backes
Aniket Kate
Matteo Maffei
Kim Pecina
2011
conf/asiacrypt
Computational Verifiable Secret Sharing Revisited.
Michael Backes
Aniket Kate
Arpita Patra
2010
conf/fc
Using Sphinx to Improve Onion Routing Circuit Construction.
Aniket Kate
Ian Goldberg
2010
conf/asiacrypt
Constant-Size Commitments to Polynomials and Their Applications.
Aniket Kate
Gregory M. Zaverucha
Ian Goldberg
Coauthors
Adil Ahmad
(1)
Adithya Bhat
(10)
Akhil Bandarupalli
(5)
Alan T. Sherman
(1)
Albert Yu
(2)
Alejandra Victoria Ospina Gracia
(1)
Alexandros Psomas
(1)
Amir Herzberg
(2)
Amit Datta
(1)
Andrew Lewis-Pye
(1)
Andrew Miller
(2)
Aniket Kate
(75)
Anna Krasnova
(1)
Arpita Patra
(1)
Arthur Blue
(1)
Bernardo Magri
(1)
Bincheng Wang
(1)
Bobby Bhattacharjee
(1)
Brandon Goodell
(1)
Bruno Ribeiro
(1)
Byoungyoung Lee
(1)
Chen-Da Liu-Zhang
(2)
Clara Schneidewind
(1)
Cristina Nita-Rotaru
(1)
Daniel Tschudi
(1)
David Chaum
(1)
Debajyoti Das
(5)
Deepak Garg
(1)
Dominique Schröder
(3)
Donghang Lu
(4)
Duc Viet Le
(3)
Easwar Vivek Mangipudi
(6)
Esfandiar Mohammadi
(4)
Fabienne Eigner
(1)
Farid Javani
(1)
Francesca Pampaloni
(1)
Giulio Malavolta
(4)
Gregory M. Zaverucha
(1)
Gustavo Franco Camilo
(1)
Hai H. Nguyen
(1)
Hamza Saleem
(1)
Hemanta K. Maji
(3)
Huangyi Ge
(1)
Ian Goldberg
(4)
Ivan Pryvalov
(3)
Jaiden Fairoze
(1)
Jeremy Clark
(2)
Jianting Zhang
(1)
Jianxiong Wang
(1)
Joeri de Ruiter
(1)
Johnnatan Messias
(1)
Jonas Schneider
(1)
Kartik Nayak
(6)
Kim Pecina
(2)
Krishna P. Gummadi
(2)
Krutarth Rao
(1)
Licheng Luo
(1)
Lizzy Tengana Hurtado
(1)
Lucjan Hanzlik
(2)
Lukas Aumayr
(2)
Mahimna Kelkar
(1)
Mainack Mondal
(5)
Matteo Maffei
(8)
Md. Endadul Hoque
(1)
Michael Backes
(9)
Michael K. Reiter
(3)
Milivoj Simeonovski
(1)
Mohsen Minaei
(7)
Moosa Yahyazadeh
(1)
Moritz Kirschte
(1)
Muhammad Bilal Zafar
(1)
Nibesh Shrestha
(4)
Nico Döttling
(1)
Ninghui Li
(3)
Omar Chowdhury
(3)
Patrick Loiseau
(1)
Pedro Moreno-Sanchez
(14)
Peter Druschel
(2)
Pratyay Mukherjee
(3)
Rahul Govind
(1)
Rohan Shrothrium
(1)
Ryan Henry
(1)
S. Chandra Mouli
(1)
Samarth Kulshreshtha
(1)
Saptarshi Ghosh
(1)
Sarang Noether
(1)
Satrajit Ghosh
(1)
Saurabh Bagchi
(4)
Sebastian Meiser
(5)
Sifu Luo
(1)
Siva Maradana
(1)
Sri Aravinda Krishnan Thyagarajan
(5)
Srivatsan Ravi
(1)
Stefanie Roos
(1)
Sze Yiu Chau
(3)
Thomas Yurek
(2)
Tiantian Gong
(6)
Tim Ruffing
(6)
Tomas Toft
(1)
Udit Desai
(1)
Uzair Mahmood
(1)
Varun Madathil
(1)
Venkat Arun
(1)
Wenhai Sun
(1)
Wuhui Chen
(1)
Xiaoyu Ji
(1)
Yanxue Jia
(2)
Yifan Song
(1)
Zhongtang Luo
(3)
Zicong Hong
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to