Aggarwal, Divesh; Kanukurthi, Bhavana; Obbattu, Sai Lakshmi Bhavana; Obremski, Maciej; Sekar, Sruthi Rate one-third non-malleable codes. (English) Zbl 07774423 Leonardi, Stefano (ed.) et al., Proceedings of the 54th annual ACM SIGACT symposium on theory of computing, STOC ’22, Rome, Italy June 20–24, 2022. New York, NY: Association for Computing Machinery (ACM). 1364-1377 (2022). MSC: 68Qxx PDFBibTeX XMLCite \textit{D. Aggarwal} et al., in: Proceedings of the 54th annual ACM SIGACT symposium on theory of computing, STOC '22, Rome, Italy June 20--24, 2022. New York, NY: Association for Computing Machinery (ACM). 1364--1377 (2022; Zbl 07774423) Full Text: DOI
Chandran, Nishanth; Kanukurthi, Bhavana; Obbattu, Sai Lakshmi Bhavana; Sekar, Sruthi Short leakage resilient and non-malleable secret sharing schemes. (English) Zbl 1516.94058 Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13507, 178-207 (2022). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{N. Chandran} et al., Lect. Notes Comput. Sci. 13507, 178--207 (2022; Zbl 1516.94058) Full Text: DOI
Kanukurthi, Bhavana; Obbattu, Sai Lakshmi Bhavana; Sekar, Sruthi; Tomy, Jenit Locally reconstructable non-malleable secret sharing. (English) Zbl 1517.94200 Tessaro, Stefano (ed.), 2nd conference on information-theoretic cryptography. ITC 2021, July 23–26, 2021, virtual conference. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 199, Article 11, 19 p. (2021). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{B. Kanukurthi} et al., LIPIcs -- Leibniz Int. Proc. Inform. 199, Article 11, 19 p. (2021; Zbl 1517.94200) Full Text: DOI
Chandran, Nishanth; Kanukurthi, Bhavana; Obbattu, Sai Lakshmi Bhavana; Sekar, Sruthi Adaptive extractors and their application to leakage resilient secret sharing. (English) Zbl 1489.94117 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 595-624 (2021). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{N. Chandran} et al., Lect. Notes Comput. Sci. 12827, 595--624 (2021; Zbl 1489.94117) Full Text: DOI
Kanukurthi, Bhavana; Obbattu, Sai Lakshmi Bhavana; Sekar, Sruthi Four-state non-malleable codes with explicit constant rate. (English) Zbl 1457.94145 J. Cryptology 33, No. 3, 1044-1079 (2020). MSC: 94A60 94A62 94B35 PDFBibTeX XMLCite \textit{B. Kanukurthi} et al., J. Cryptology 33, No. 3, 1044--1079 (2020; Zbl 1457.94145) Full Text: DOI
Chattopadhyay, Eshan; Kanukurthi, Bhavana; Obbattu, Sai Lakshmi Bhavana; Sekar, Sruthi Privacy amplification from non-malleable codes. (English) Zbl 1456.94062 Hao, Feng (ed.) et al., Progress in cryptology – INDOCRYPT 2019. 20th international conference on cryptology in India, Hyderabad, India, December 15–18, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11898, 318-337 (2019). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{E. Chattopadhyay} et al., Lect. Notes Comput. Sci. 11898, 318--337 (2019; Zbl 1456.94062) Full Text: DOI
Kanukurthi, Bhavana; Obbattu, Sai Lakshmi Bhavana; Sekar, Sruthi Non-malleable randomness encoders and their applications. (English) Zbl 1415.94445 Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10822, 589-617 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Kanukurthi} et al., Lect. Notes Comput. Sci. 10822, 589--617 (2018; Zbl 1415.94445) Full Text: DOI
Kanukurthi, Bhavana; Obbattu, Sai Lakshmi Bhavana; Sekar, Sruthi Four-state non-malleable codes with explicit constant rate. (English) Zbl 1412.94181 Kalai, Yael (ed.) et al., Theory of cryptography. 15th international conference, TCC 2017, Baltimore, MD, USA, November 12–15, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10678, 344-375 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Kanukurthi} et al., Lect. Notes Comput. Sci. 10678, 344--375 (2017; Zbl 1412.94181) Full Text: DOI
Chandran, Nishanth; Kanukurthi, Bhavana; Raghuraman, Srinivasan Information-theoretic local non-malleable codes and their applications. (English) Zbl 1382.94081 Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 367-392 (2016). MSC: 94A60 94B35 PDFBibTeX XMLCite \textit{N. Chandran} et al., Lect. Notes Comput. Sci. 9563, 367--392 (2016; Zbl 1382.94081) Full Text: DOI
Chandran, Nishanth; Kanukurthi, Bhavana; Ostrovsky, Rafail; Reyzin, Leonid Privacy amplification with asymptotically optimal entropy loss. (English) Zbl 1321.94103 J. ACM 61, No. 5, Article No. 29, 28 p. (2014). MSC: 94A62 PDFBibTeX XMLCite \textit{N. Chandran} et al., J. ACM 61, No. 5, Article No. 29, 28 p. (2014; Zbl 1321.94103) Full Text: DOI
Ananth, Prabhanjan; Chandran, Nishanth; Goyal, Vipul; Kanukurthi, Bhavana; Ostrovsky, Rafail Achieving privacy in verifiable computation with multiple servers – without FHE and without pre-processing. (English) Zbl 1335.94026 Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 149-166 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{P. Ananth} et al., Lect. Notes Comput. Sci. 8383, 149--166 (2014; Zbl 1335.94026) Full Text: DOI
Chandran, Nishanth; Kanukurthi, Bhavana; Ostrovsky, Rafail Locally updatable and locally decodable codes. (English) Zbl 1326.94139 Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 489-514 (2014). MSC: 94B35 PDFBibTeX XMLCite \textit{N. Chandran} et al., Lect. Notes Comput. Sci. 8349, 489--514 (2014; Zbl 1326.94139) Full Text: DOI
Dodis, Yevgeniy; Kanukurthi, Bhavana; Katz, Jonathan; Reyzin, Leonid; Smith, Adam Robust fuzzy extractors and authenticated key agreement from close secrets. (English) Zbl 1364.94577 IEEE Trans. Inf. Theory 58, No. 9, 6207-6222 (2012). MSC: 94A62 94D05 PDFBibTeX XMLCite \textit{Y. Dodis} et al., IEEE Trans. Inf. Theory 58, No. 9, 6207--6222 (2012; Zbl 1364.94577) Full Text: DOI
Kalai, Yael Tauman; Kanukurthi, Bhavana; Sahai, Amit Cryptography with tamperable and leaky memory. (English) Zbl 1287.94077 Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 373-390 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. T. Kalai} et al., Lect. Notes Comput. Sci. 6841, 373--390 (2011; Zbl 1287.94077) Full Text: DOI
Chandran, Nishanth; Kanukurthi, Bhavana; Ostrovsky, Rafail; Reyzin, Leonid Privacy amplification with asymptotically optimal entropy loss. (English) Zbl 1293.94101 Proceedings of the 42nd annual ACM symposium on theory of computing, STOC ’10. Cambridge, MA, USA, June 5–8, 2010. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-817-9). 785-794 (2010). MSC: 94A62 PDFBibTeX XMLCite \textit{N. Chandran} et al., in: Proceedings of the 42nd annual ACM symposium on theory of computing, STOC '10. Cambridge, MA, USA, June 5--8, 2010. New York, NY: Association for Computing Machinery (ACM). 785--794 (2010; Zbl 1293.94101) Full Text: DOI
Kanukurthi, Bhavana; Reyzin, Leonid Key agreement from close secrets over unsecured channels. (English) Zbl 1239.94076 Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 206-223 (2009). MSC: 94A62 PDFBibTeX XMLCite \textit{B. Kanukurthi} and \textit{L. Reyzin}, Lect. Notes Comput. Sci. 5479, 206--223 (2009; Zbl 1239.94076) Full Text: DOI
Kanukurthi, Bhavana; Reyzin, Leonid An improved robust fuzzy extractor. (English) Zbl 1180.68150 Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 156-171 (2008). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{B. Kanukurthi} and \textit{L. Reyzin}, Lect. Notes Comput. Sci. 5229, 156--171 (2008; Zbl 1180.68150) Full Text: DOI arXiv