What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Pratyay Mukherjee
Google Scholar
ORCID:
0000-0002-0995-9555
32
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Vitārit: Paying for Threshold Services on Bitcoin and Friends.
Sri Aravinda Krishnan Thyagarajan
Easwar Vivek Mangipudi
Lucjan Hanzlik
Aniket Kate
Pratyay Mukherjee
2025
conf/pkc
Universally Composable Non-interactive Zero-Knowledge from Sigma Protocols via a New Straight-Line Compiler.
Megan Chen
Pousali Dey
Chaya Ganesh
Pratyay Mukherjee
Pratik Sarkar
Swagata Sasmal
2025
journals/cic
HiSE: Hierarchical (Threshold) Symmetric-key Encryption.
Pousali Dey
Pratyay Mukherjee
Swagata Sasmal
Rohit Sinha
2024
conf/ccs
Non-interactive VSS using Class Groups and Application to DKG.
Aniket Kate
Easwar Vivek Mangipudi
Pratyay Mukherjee
Hamza Saleem
Sri Aravinda Krishnan Thyagarajan
2024
conf/crypto
Scalable Multiparty Computation from Non-linear Secret Sharing.
Sanjam Garg
Abhishek Jain
Pratyay Mukherjee
Mingyuan Wang
2024
conf/sp
hinTS: Threshold Signatures with Silent Setup.
Sanjam Garg
Abhishek Jain
Pratyay Mukherjee
Rohit Sinha
Mingyuan Wang
Yinuo Zhang
2023
conf/ccs
FlexiRand: Output Private (Distributed) VRFs and Application to Blockchains.
Aniket Kate
Easwar Vivek Mangipudi
Siva Maradana
Pratyay Mukherjee
2023
conf/crypto
Cryptography with Weights: MPC, Encryption and Signatures.
Sanjam Garg
Abhishek Jain
Pratyay Mukherjee
Rohit Sinha
Mingyuan Wang
Yinuo Zhang
2023
conf/sp
Threshold Signatures in the Multiverse.
Leemon Baird
Sanjam Garg
Abhishek Jain
Pratyay Mukherjee
Rohit Sinha
Mingyuan Wang
Yinuo Zhang
2023
conf/pkc
Round-Optimal Oblivious Transfer and MPC from Computational CSIDH.
Saikrishna Badrinarayanan
Daniel Masny
Pratyay Mukherjee
Sikhar Patranabis
Srinivasan Raghuraman
Pratik Sarkar
2023
conf/tcc
On the Round Complexity of Fully Secure Solitary MPC with Honest Majority.
Saikrishna Badrinarayanan
Peihan Miao
Pratyay Mukherjee
Divya Ravi
2022
conf/ccs
i-TiRE: Incremental Timed-Release Encryption or How to use Timed-Release Encryption on Blockchains?
Leemon Baird
Pratyay Mukherjee
Rohit Sinha
2022
conf/crypto
A More Complete Analysis of the Signal Double Ratchet Algorithm.
Alexander Bienstock
Jaiden Fairoze
Sanjam Garg
Pratyay Mukherjee
Srinivasan Raghuraman
2022
conf/acns
Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security.
Saikrishna Badrinarayanan
Daniel Masny
Pratyay Mukherjee
2021
conf/ccs
Amortized Threshold Symmetric-key Encryption.
Mihai Christodorescu
Sivanarayana Gaddam
Pratyay Mukherjee
Rohit Sinha
2021
conf/pkc
BETA: Biometric-Enabled Threshold Authentication.
Shashank Agrawal
Saikrishna Badrinarayanan
Payman Mohassel
Pratyay Mukherjee
Sikhar Patranabis
2020
journals/joc
Continuously Non-malleable Codes in the Split-State Model.
Sebastian Faust
Pratyay Mukherjee
Jesper Buus Nielsen
Daniele Venturi
2020
conf/ccs
Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching.
Shashank Agrawal
Saikrishna Badrinarayanan
Pratyay Mukherjee
Peter Rindal
2020
conf/tcc
Reusable Two-Round MPC from DDH.
James Bartusek
Sanjam Garg
Daniel Masny
Pratyay Mukherjee
2019
conf/crypto
Continuous Space-Bounded Non-malleable Codes from Stronger Proofs-of-Space.
Binyi Chen
Yilei Chen
Kristina Hostáková
Pratyay Mukherjee
2019
conf/asiacrypt
Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures.
Yilei Chen
Nicholas Genise
Pratyay Mukherjee
2018
conf/ccs
PASTA: PASsword-based Threshold Authentication.
Shashank Agrawal
Peihan Miao
Payman Mohassel
Pratyay Mukherjee
2018
conf/ccs
DiSE: Distributed Symmetric-key Encryption.
Shashank Agrawal
Payman Mohassel
Pratyay Mukherjee
Peter Rindal
2017
journals/joc
Bounded Tamper Resilience: How to Go Beyond the Algebraic Barrier.
Ivan Damgård
Sebastian Faust
Pratyay Mukherjee
Daniele Venturi
2017
conf/crypto
Non-Malleable Codes for Space-Bounded Tampering.
Sebastian Faust
Kristina Hostáková
Pratyay Mukherjee
Daniele Venturi
2016
conf/eurocrypt
The Exact Round Complexity of Secure Computation.
Sanjam Garg
Pratyay Mukherjee
Omkant Pandey
Antigoni Polychroniadou
2016
conf/eurocrypt
Two Round Multiparty Computation via Multi-key FHE.
Pratyay Mukherjee
Daniel Wichs
2016
conf/tcc
Secure Obfuscation in a Weak Multilinear Map Model.
Sanjam Garg
Eric Miles
Pratyay Mukherjee
Amit Sahai
Akshayaram Srinivasan
Mark Zhandry
2015
conf/pkc
A Tamper and Leakage Resilient von Neumann Architecture.
Sebastian Faust
Pratyay Mukherjee
Jesper Buus Nielsen
Daniele Venturi
2014
conf/eurocrypt
Efficient Non-malleable Codes and Key-Derivation for Poly-size Tampering Circuits.
Sebastian Faust
Pratyay Mukherjee
Daniele Venturi
Daniel Wichs
2014
conf/tcc
Continuous Non-malleable Codes.
Sebastian Faust
Pratyay Mukherjee
Jesper Buus Nielsen
Daniele Venturi
2013
conf/asiacrypt
Bounded Tamper Resilience: How to Go beyond the Algebraic Barrier.
Ivan Damgård
Sebastian Faust
Pratyay Mukherjee
Daniele Venturi
Coauthors
Abhishek Jain
(4)
Akshayaram Srinivasan
(1)
Alexander Bienstock
(1)
Amit Sahai
(1)
Aniket Kate
(3)
Antigoni Polychroniadou
(1)
Binyi Chen
(1)
Chaya Ganesh
(1)
Daniel Masny
(3)
Daniel Wichs
(2)
Daniele Venturi
(7)
Divya Ravi
(1)
Easwar Vivek Mangipudi
(3)
Eric Miles
(1)
Hamza Saleem
(1)
Ivan Damgård
(2)
Jaiden Fairoze
(1)
James Bartusek
(1)
Jesper Buus Nielsen
(3)
Kristina Hostáková
(2)
Leemon Baird
(2)
Lucjan Hanzlik
(1)
Mark Zhandry
(1)
Megan Chen
(1)
Mihai Christodorescu
(1)
Mingyuan Wang
(4)
Nicholas Genise
(1)
Omkant Pandey
(1)
Payman Mohassel
(3)
Peihan Miao
(2)
Peter Rindal
(2)
Pousali Dey
(2)
Pratik Sarkar
(2)
Pratyay Mukherjee
(32)
Rohit Sinha
(6)
Saikrishna Badrinarayanan
(5)
Sanjam Garg
(8)
Sebastian Faust
(7)
Shashank Agrawal
(4)
Sikhar Patranabis
(2)
Siva Maradana
(1)
Sivanarayana Gaddam
(1)
Sri Aravinda Krishnan Thyagarajan
(2)
Srinivasan Raghuraman
(2)
Swagata Sasmal
(2)
Yilei Chen
(2)
Yinuo Zhang
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to