What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Manoj Prabhakaran
Google Scholar
57
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/crypto
Malicious Security for SCALES - Outsourced Computation with Ephemeral Servers.
Anasuya Acharya
Carmit Hazay
Vladimir Kolesnikov
Manoj Prabhakaran
2024
conf/pkc
R3PO: Reach-Restricted Reactive Program Obfuscation and Its Applications.
Kaartik Bhushan
Sai Lakshmi Bhavana Obbattu
Manoj Prabhakaran
Rajeev Raghunath
2024
conf/asiacrypt
Leakage-Resilient Incompressible Cryptography: Constructions and Barriers.
Kaartik Bhushan
Rishab Goyal
Venkata Koppula
Varun Narayanan
Manoj Prabhakaran
Mahesh Sreekumar Rajasree
2024
conf/asiacrypt
Randomness in Private Sequential Stateless Protocols.
Hari Krishnan P. Anilkumar
Varun Narayanan
Manoj Prabhakaran
Vinod M. Prabhakaran
2023
conf/pkc
A Map of Witness Maps: New Definitions and Connections.
Suvradip Chakraborty
Manoj Prabhakaran
Daniel Wichs
2023
conf/tcc
CASE: A New Frontier in Public-Key Authenticated Encryption.
Shashank Agrawal
Shweta Agrawal
Manoj Prabhakaran
Rajeev Raghunath
Jayesh Singla
2022
conf/eurocrypt
Secure Non-interactive Reduction and Spectral Analysis of Correlations.
Pratyush Agarwal
Varun Narayanan
Shreya Pathak
Manoj Prabhakaran
Vinod M. Prabhakaran
Mohammad Ali Rehan
2022
conf/eurocrypt
COA-Secure Obfuscation and Applications.
Ran Canetti
Suvradip Chakraborty
Dakshita Khurana
Nishant Kumar
Oxana Poburinnaya
Manoj Prabhakaran
2022
conf/tcc
Secure Non-interactive Reducibility is Decidable.
Kaartik Bhushan
Ankit Kumar Misra
Varun Narayanan
Manoj Prabhakaran
2022
conf/tcc
Oblivious-Transfer Complexity of Noisy Coin-Toss via Secure Zero Communication Reductions.
Saumya Goyal
Varun Narayanan
Manoj Prabhakaran
2022
conf/tcc
SCALES - MPC with Small Clients and Larger Ephemeral Servers.
Anasuya Acharya
Carmit Hazay
Vladimir Kolesnikov
Manoj Prabhakaran
2021
conf/crypto
Secure Computation from One-Way Noisy Communication, or: Anti-correlation via Anti-concentration.
Shweta Agrawal
Yuval Ishai
Eyal Kushilevitz
Varun Narayanan
Manoj Prabhakaran
Vinod M. Prabhakaran
Alon Rosen
2021
conf/tcc
On Communication Models and Best-Achievable Security in Two-Round MPC.
Aarushi Goel
Abhishek Jain
Manoj Prabhakaran
Rajeev Raghunath
2020
conf/esorics
A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing.
Shweta Agrawal
Rachit Garg
Nishant Kumar
Manoj Prabhakaran
2020
conf/pkc
Witness Maps and Applications.
Suvradip Chakraborty
Manoj Prabhakaran
Daniel Wichs
2020
conf/asiacrypt
Cryptography from One-Way Communication: On Completeness of Finite Channels.
Shweta Agrawal
Yuval Ishai
Eyal Kushilevitz
Varun Narayanan
Manoj Prabhakaran
Vinod M. Prabhakaran
Alon Rosen
2020
conf/tcc
Zero-Communication Reductions.
Varun Narayanan
Manoj Prabhakaran
Vinod M. Prabhakaran
2019
conf/iciss
An Introduction to the CellTree Paradigm (Invited Paper).
Anasuya Acharya
Manoj Prabhakaran
Akash Trehan
2019
conf/eurocrypt
Uncovering Algebraic Structures in the MPC Landscape.
Navneet Agarwal
Sanat Anand
Manoj Prabhakaran
2018
conf/pkc
Towards Characterizing Securely Computable Two-Party Randomized Functions.
Deepesh Data
Manoj Prabhakaran
2017
journals/joc
Reconciling Non-malleability with Homomorphic Encryption.
Manoj Prabhakaran
Mike Rosulek
2016
conf/crypto
Secure Protocol Transformations.
Yuval Ishai
Eyal Kushilevitz
Manoj Prabhakaran
Amit Sahai
Ching-Hua Yu
2016
conf/eurocrypt
All Complete Functionalities are Reversible.
Dakshita Khurana
Daniel Kraschewski
Hemanta K. Maji
Manoj Prabhakaran
Amit Sahai
2016
conf/tcc
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents.
Shashank Agrawal
Manoj Prabhakaran
Ching-Hua Yu
2016
conf/tcc
Optimal Computational Split-state Non-malleable Codes.
Divesh Aggarwal
Shashank Agrawal
Divya Gupta
Hemanta K. Maji
Omkant Pandey
Manoj Prabhakaran
2015
conf/crypto
Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations.
Shashank Agrawal
Divya Gupta
Hemanta K. Maji
Omkant Pandey
Manoj Prabhakaran
2015
conf/pkc
On the Practical Security of Inner Product Functional Encryption.
Shashank Agrawal
Shweta Agrawal
Saikrishna Badrinarayanan
Abishek Kumarasubramanian
Manoj Prabhakaran
Amit Sahai
2015
conf/eurocrypt
Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data.
Shashank Agrawal
Shweta Agrawal
Manoj Prabhakaran
2015
conf/tcc
Obfuscation-Based Non-black-box Simulation and Four Message Concurrent Zero Knowledge for NP.
Omkant Pandey
Manoj Prabhakaran
Amit Sahai
2015
conf/tcc
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations.
Shashank Agrawal
Divya Gupta
Hemanta K. Maji
Omkant Pandey
Manoj Prabhakaran
2014
conf/ccs
Controlled Functional Encryption.
Muhammad Naveed
Shashank Agrawal
Manoj Prabhakaran
XiaoFeng Wang
Erman Ayday
Jean-Pierre Hubaux
Carl A. Gunter
2014
conf/crypto
On the Communication Complexity of Secure Computation.
Deepesh Data
Manoj Prabhakaran
Vinod M. Prabhakaran
2014
conf/sp
Dynamic Searchable Encryption via Blind Storage.
Muhammad Naveed
Manoj Prabhakaran
Carl A. Gunter
2014
conf/eurocrypt
A Full Characterization of Completeness for Two-Party Randomized Function Evaluation.
Daniel Kraschewski
Hemanta K. Maji
Manoj Prabhakaran
Amit Sahai
2014
conf/tcc
On the Power of Public-Key Encryption in Secure Computation.
Mohammad Mahmoody
Hemanta K. Maji
Manoj Prabhakaran
2014
conf/tcc
Lower Bounds in the Hardware Token Model.
Shashank Agrawal
Prabhanjan Ananth
Vipul Goyal
Manoj Prabhakaran
Alon Rosen
2013
conf/crypto
On Fair Exchange, Fair Coins and Fair Sampling.
Shashank Agrawal
Manoj Prabhakaran
2012
conf/crypto
New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation.
Shweta Agrawal
Vipul Goyal
Abhishek Jain
Manoj Prabhakaran
Amit Sahai
2011
journals/joc
Resource Fairness and Composability of Cryptographic Protocols.
Juan A. Garay
Philip D. MacKenzie
Manoj Prabhakaran
Ke Yang
2011
conf/crypto
Constant-Rate Oblivious Transfer from Noisy Channels.
Yuval Ishai
Eyal Kushilevitz
Rafail Ostrovsky
Manoj Prabhakaran
Amit Sahai
Jürg Wullschleger
2011
conf/ctrsa
Attribute-Based Signatures.
Hemanta K. Maji
Manoj Prabhakaran
Mike Rosulek
2011
conf/eurocrypt
Efficient Non-interactive Secure Computation.
Yuval Ishai
Eyal Kushilevitz
Rafail Ostrovsky
Manoj Prabhakaran
Amit Sahai
2011
conf/tcc
Exploring the Limits of Common Coins Using Frontier Analysis of Protocols.
Hemanta K. Maji
Pichayoot Ouppaphan
Manoj Prabhakaran
Mike Rosulek
2010
conf/crypto
A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security.
Hemanta K. Maji
Manoj Prabhakaran
Mike Rosulek
2009
conf/esorics
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption.
Rakeshbabu Bobba
Himanshu Khurana
Manoj Prabhakaran
2009
conf/ctrsa
Statistically Hiding Sets.
Manoj Prabhakaran
Rui Xue
2009
conf/tcc
Secure Arithmetic Computation with No Honest Majority.
Yuval Ishai
Manoj Prabhakaran
Amit Sahai
2009
conf/tcc
Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation.
Hemanta K. Maji
Manoj Prabhakaran
Mike Rosulek
2008
conf/crypto
Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations.
Manoj Prabhakaran
Mike Rosulek
2008
conf/crypto
Founding Cryptography on Oblivious Transfer - Efficiently.
Yuval Ishai
Manoj Prabhakaran
Amit Sahai
2008
conf/asiacrypt
Towards Robust Computation on Encrypted Data.
Manoj Prabhakaran
Mike Rosulek
2007
journals/joc
Concurrent Composition of Secure Protocols in the Timing Model.
Yael Tauman Kalai
Yehuda Lindell
Manoj Prabhakaran
2007
conf/crypto
Rerandomizable RCCA Encryption.
Manoj Prabhakaran
Mike Rosulek
2006
conf/eurocrypt
Private Circuits II: Keeping Secrets in Tamperable Circuits.
Yuval Ishai
Manoj Prabhakaran
Amit Sahai
David A. Wagner
2006
conf/tcc
Resource Fairness and Composability of Cryptographic Protocols.
Juan A. Garay
Philip D. MacKenzie
Manoj Prabhakaran
Ke Yang
2005
conf/tcc
Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation.
Manoj Prabhakaran
Amit Sahai
2004
conf/eurocrypt
Positive Results and Techniques for Obfuscation.
Ben Lynn
Manoj Prabhakaran
Amit Sahai
Coauthors
Aarushi Goel
(1)
Abhishek Jain
(2)
Abishek Kumarasubramanian
(1)
Akash Trehan
(1)
Alon Rosen
(3)
Amit Sahai
(13)
Anasuya Acharya
(3)
Ankit Kumar Misra
(1)
Ben Lynn
(1)
Carl A. Gunter
(2)
Carmit Hazay
(2)
Ching-Hua Yu
(2)
Dakshita Khurana
(2)
Daniel Kraschewski
(2)
Daniel Wichs
(2)
David A. Wagner
(1)
Deepesh Data
(2)
Divesh Aggarwal
(1)
Divya Gupta
(3)
Erman Ayday
(1)
Eyal Kushilevitz
(5)
Hari Krishnan P. Anilkumar
(1)
Hemanta K. Maji
(10)
Himanshu Khurana
(1)
Jayesh Singla
(1)
Jean-Pierre Hubaux
(1)
Juan A. Garay
(2)
Jürg Wullschleger
(1)
Kaartik Bhushan
(3)
Ke Yang
(2)
Mahesh Sreekumar Rajasree
(1)
Manoj Prabhakaran
(57)
Mike Rosulek
(8)
Mohammad Ali Rehan
(1)
Mohammad Mahmoody
(1)
Muhammad Naveed
(2)
Navneet Agarwal
(1)
Nishant Kumar
(2)
Omkant Pandey
(4)
Oxana Poburinnaya
(1)
Philip D. MacKenzie
(2)
Pichayoot Ouppaphan
(1)
Prabhanjan Ananth
(1)
Pratyush Agarwal
(1)
Rachit Garg
(1)
Rafail Ostrovsky
(2)
Rajeev Raghunath
(3)
Rakeshbabu Bobba
(1)
Ran Canetti
(1)
Rishab Goyal
(1)
Rui Xue
(1)
Sai Lakshmi Bhavana Obbattu
(1)
Saikrishna Badrinarayanan
(1)
Sanat Anand
(1)
Saumya Goyal
(1)
Shashank Agrawal
(10)
Shreya Pathak
(1)
Shweta Agrawal
(7)
Suvradip Chakraborty
(3)
Varun Narayanan
(8)
Venkata Koppula
(1)
Vinod M. Prabhakaran
(6)
Vipul Goyal
(2)
Vladimir Kolesnikov
(2)
XiaoFeng Wang
(1)
Yael Tauman Kalai
(1)
Yehuda Lindell
(1)
Yuval Ishai
(8)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to