What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Sarvar Patel
Google Scholar
30
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurocrypt
Plinko: Single-Server PIR with Efficient Updates via Invertible PRFs.
Alexander Hoover
Sarvar Patel
Giuseppe Persiano
Kevin Yeo
2024
conf/ccs
Efficient Secret Sharing for Large-Scale Applications.
Sarvar Patel
Giuseppe Persiano
Joon Young Seo
Kevin Yeo
2024
conf/uss
Batch PIR and Labeled PSI with Oblivious Ciphertext Compression.
Alexander Bienstock
Sarvar Patel
Joon Young Seo
Kevin Yeo
2023
journals/popets
Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption.
Ghous Amjad
Sarvar Patel
Giuseppe Persiano
Kevin Yeo
Moti Yung
2023
conf/uss
Don't be Dense: Efficient Keyword PIR for Sparse Databases.
Sarvar Patel
Joon Young Seo
Kevin Yeo
2023
conf/uss
Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume-Hiding Multi-Maps.
Alexander Bienstock
Sarvar Patel
Joon Young Seo
Kevin Yeo
2021
conf/uss
Communication-Computation Trade-offs in PIR.
Asra Ali
Tancrède Lepoint
Sarvar Patel
Mariana Raykova
Phillipp Schoppmann
Karn Seth
Kevin Yeo
2021
conf/asiacrypt
Private Join and Compute from PIR with Default.
Tancrède Lepoint
Sarvar Patel
Mariana Raykova
Karn Seth
Ni Trieu
2021
conf/asiacrypt
Efficient Boolean Search over Encrypted Data with Reduced Leakage.
Sarvar Patel
Giuseppe Persiano
Joon Young Seo
Kevin Yeo
2020
conf/crypto
Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model.
Sarvar Patel
Giuseppe Persiano
Kevin Yeo
2020
conf/crypto
Two-Sided Malicious Security for Private Intersection-Sum with Cardinality.
Peihan Miao
Sarvar Patel
Mariana Raykova
Karn Seth
Moti Yung
2020
conf/eurosp
On Deploying Secure Computing: Private Intersection-Sum-with-Cardinality.
Mihaela Ion
Ben Kreuter
Ahmet Erhan Nergiz
Sarvar Patel
Shobhit Saxena
Karn Seth
Mariana Raykova
David Shanahan
Moti Yung
2019
conf/ccs
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing.
Sarvar Patel
Giuseppe Persiano
Kevin Yeo
Moti Yung
2019
conf/uss
Protecting accounts from credential stuffing with password breach alerting.
Kurt Thomas
Jennifer Pullman
Kevin Yeo
Ananth Raghunathan
Patrick Gage Kelley
Luca Invernizzi
Borbala Benko
Tadek Pietraszek
Sarvar Patel
Dan Boneh
Elie Bursztein
2018
conf/ccs
Private Stateful Information Retrieval.
Sarvar Patel
Giuseppe Persiano
Kevin Yeo
2018
conf/esorics
Symmetric Searchable Encryption with Sharing and Unsharing.
Sarvar Patel
Giuseppe Persiano
Kevin Yeo
2017
conf/ccs
Practical Secure Aggregation for Privacy-Preserving Machine Learning.
Kallista A. Bonawitz
Vladimir Ivanov
Ben Kreuter
Antonio Marcedone
H. Brendan McMahan
Sarvar Patel
Daniel Ramage
Aaron Segal
Karn Seth
2012
conf/acns
Contextual OTP: Mitigating Emerging Man-in-the-Middle Attacks with Wireless Hardware Tokens.
Assaf Ben-David
Omer Berkman
Yossi Matias
Sarvar Patel
Cem Paya
Moti Yung
2005
conf/ctrsa
Hard Bits of the Discrete Log with Applications to Password Authentication.
Philip D. MacKenzie
Sarvar Patel
2004
conf/sacrypt
Efficient Constructions of Variable-Input-Length Block Ciphers.
Sarvar Patel
Zulfikar Ramzan
Ganapathy S. Sundaram
2002
conf/sacrypt
An Efficient MAC for Short Messages.
Sarvar Patel
2002
conf/sacrypt
Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive.
Sarvar Patel
Zulfikar Ramzan
Ganapathy S. Sundaram
2000
conf/eurocrypt
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman.
Victor Boyko
Philip D. MacKenzie
Sarvar Patel
2000
conf/asiacrypt
Password-Authenticated Key Exchange Based on RSA.
Philip D. MacKenzie
Sarvar Patel
Ram Swaminathan
1999
conf/fse
SOBER Crytanalysis.
Daniel Bleichenbacher
Sarvar Patel
1999
conf/fse
Towards Making Luby-Rackoff Ciphers Optimal and Practical.
Sarvar Patel
Zulfikar Ramzan
Ganapathy S. Sundaram
1999
conf/crypto
SQUARE HASH: Fast Message Authenication via Optimized Universal Hash Functions.
Mark Etzel
Sarvar Patel
Zulfikar Ramzan
1998
conf/crypto
An Efficient Discrete Log Pseudo Random Generator.
Sarvar Patel
Ganapathy S. Sundaram
1998
conf/sacrypt
Over the Air Service Provisioning.
Sarvar Patel
1997
conf/sp
Number Theoretic Attacks on Secure Password Schemes.
Sarvar Patel
Coauthors
Aaron Segal
(1)
Ahmet Erhan Nergiz
(1)
Alexander Bienstock
(2)
Alexander Hoover
(1)
Ananth Raghunathan
(1)
Antonio Marcedone
(1)
Asra Ali
(1)
Assaf Ben-David
(1)
Ben Kreuter
(2)
Borbala Benko
(1)
Cem Paya
(1)
Dan Boneh
(1)
Daniel Bleichenbacher
(1)
Daniel Ramage
(1)
David Shanahan
(1)
Elie Bursztein
(1)
Ganapathy S. Sundaram
(4)
Ghous Amjad
(1)
Giuseppe Persiano
(8)
H. Brendan McMahan
(1)
Jennifer Pullman
(1)
Joon Young Seo
(5)
Kallista A. Bonawitz
(1)
Karn Seth
(5)
Kevin Yeo
(13)
Kurt Thomas
(1)
Luca Invernizzi
(1)
Mariana Raykova
(4)
Mark Etzel
(1)
Mihaela Ion
(1)
Moti Yung
(5)
Ni Trieu
(1)
Omer Berkman
(1)
Patrick Gage Kelley
(1)
Peihan Miao
(1)
Philip D. MacKenzie
(3)
Phillipp Schoppmann
(1)
Ram Swaminathan
(1)
Sarvar Patel
(30)
Shobhit Saxena
(1)
Tadek Pietraszek
(1)
Tancrède Lepoint
(2)
Victor Boyko
(1)
Vladimir Ivanov
(1)
Yossi Matias
(1)
Zulfikar Ramzan
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to