What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Shashank Agrawal
Google Scholar
23
publications in security and cryptology related venues
Year
Venue
Title
2023
conf/tcc
CASE: A New Frontier in Public-Key Authenticated Encryption.
Shashank Agrawal
Shweta Agrawal
Manoj Prabhakaran
Rajeev Raghunath
Jayesh Singla
2021
conf/pkc
BETA: Biometric-Enabled Threshold Authentication.
Shashank Agrawal
Saikrishna Badrinarayanan
Payman Mohassel
Pratyay Mukherjee
Sikhar Patranabis
2021
conf/acsac
2D-2FA: A New Dimension in Two-Factor Authentication.
Maliheh Shirvanian
Shashank Agrawal
2020
conf/ccs
Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching.
Shashank Agrawal
Saikrishna Badrinarayanan
Pratyay Mukherjee
Peter Rindal
2020
conf/fc
Zether: Towards Privacy in a Smart Contract World.
Benedikt Bünz
Shashank Agrawal
Mahdi Zamani
Dan Boneh
2020
conf/asiacrypt
KVaC: Key-Value Commitments for Blockchains and Beyond.
Shashank Agrawal
Srinivasan Raghuraman
2018
conf/ccs
PASTA: PASsword-based Threshold Authentication.
Shashank Agrawal
Peihan Miao
Payman Mohassel
Pratyay Mukherjee
2018
conf/ccs
DiSE: Distributed Symmetric-key Encryption.
Shashank Agrawal
Payman Mohassel
Pratyay Mukherjee
Peter Rindal
2018
conf/crypto
Non-Interactive Zero-Knowledge Proofs for Composite Statements.
Shashank Agrawal
Chaya Ganesh
Payman Mohassel
2018
conf/tcc
Impossibility of Simulation Secure Functional Encryption Even with Random Oracles.
Shashank Agrawal
Venkata Koppula
Brent Waters
2017
conf/ccs
FAME: Fast Attribute-based Message Encryption.
Shashank Agrawal
Melissa Chase
2017
conf/eurocrypt
Simplifying Design and Analysis of Complex Predicate Encryption Schemes.
Shashank Agrawal
Melissa Chase
2017
conf/eurocrypt
Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions.
Shashank Agrawal
David J. Wu
2016
conf/tcc
Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents.
Shashank Agrawal
Manoj Prabhakaran
Ching-Hua Yu
2016
conf/tcc
Optimal Computational Split-state Non-malleable Codes.
Divesh Aggarwal
Shashank Agrawal
Divya Gupta
Hemanta K. Maji
Omkant Pandey
Manoj Prabhakaran
2016
conf/tcc
A Study of Pair Encodings: Predicate Encryption in Prime Order Groups.
Shashank Agrawal
Melissa Chase
2015
conf/crypto
Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations.
Shashank Agrawal
Divya Gupta
Hemanta K. Maji
Omkant Pandey
Manoj Prabhakaran
2015
conf/pkc
On the Practical Security of Inner Product Functional Encryption.
Shashank Agrawal
Shweta Agrawal
Saikrishna Badrinarayanan
Abishek Kumarasubramanian
Manoj Prabhakaran
Amit Sahai
2015
conf/eurocrypt
Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data.
Shashank Agrawal
Shweta Agrawal
Manoj Prabhakaran
2015
conf/tcc
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations.
Shashank Agrawal
Divya Gupta
Hemanta K. Maji
Omkant Pandey
Manoj Prabhakaran
2014
conf/ccs
Controlled Functional Encryption.
Muhammad Naveed
Shashank Agrawal
Manoj Prabhakaran
XiaoFeng Wang
Erman Ayday
Jean-Pierre Hubaux
Carl A. Gunter
2014
conf/tcc
Lower Bounds in the Hardware Token Model.
Shashank Agrawal
Prabhanjan Ananth
Vipul Goyal
Manoj Prabhakaran
Alon Rosen
2013
conf/crypto
On Fair Exchange, Fair Coins and Fair Sampling.
Shashank Agrawal
Manoj Prabhakaran
Coauthors
Abishek Kumarasubramanian
(1)
Alon Rosen
(1)
Amit Sahai
(1)
Benedikt Bünz
(1)
Brent Waters
(1)
Carl A. Gunter
(1)
Chaya Ganesh
(1)
Ching-Hua Yu
(1)
Dan Boneh
(1)
David J. Wu
(1)
Divesh Aggarwal
(1)
Divya Gupta
(3)
Erman Ayday
(1)
Hemanta K. Maji
(3)
Jayesh Singla
(1)
Jean-Pierre Hubaux
(1)
Mahdi Zamani
(1)
Maliheh Shirvanian
(1)
Manoj Prabhakaran
(10)
Melissa Chase
(3)
Muhammad Naveed
(1)
Omkant Pandey
(3)
Payman Mohassel
(4)
Peihan Miao
(1)
Peter Rindal
(2)
Prabhanjan Ananth
(1)
Pratyay Mukherjee
(4)
Rajeev Raghunath
(1)
Saikrishna Badrinarayanan
(3)
Shashank Agrawal
(23)
Shweta Agrawal
(3)
Sikhar Patranabis
(1)
Srinivasan Raghuraman
(1)
Venkata Koppula
(1)
Vipul Goyal
(1)
XiaoFeng Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to