Follow
Mayank Varia
Mayank Varia
Boston University, Computing and Data Sciences
Verified email at bu.edu - Homepage
Title
Cited by
Cited by
Year
SoK: Cryptographically protected database search
B Fuller, M Varia, A Yerukhimovich, E Shen, A Hamlin, V Gadepally, ...
2017 IEEE Symposium on Security and Privacy (SP), 172-191, 2017
1732017
Conclave: secure multi-party computation on big data
N Volgushev, M Schwarzkopf, B Getchell, M Varia, A Lapets, A Bestavros
Proceedings of the Fourteenth EuroSys Conference 2019, 1-18, 2019
1722019
Obfuscation of hyperplane membership
R Canetti, GN Rothblum, M Varia
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
1252010
Computing on masked data: a high performance method for improving big data veracity
J Kepner, V Gadepally, P Michaleas, N Schear, M Varia, A Yerukhimovich, ...
2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014
1142014
On symmetric encryption and point obfuscation
R Canetti, Y Tauman Kalai, M Varia, D Wichs
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
922010
Principal inertia components and applications
F du Pin Calmon, A Makhdoumi, M Médard, M Varia, M Christiansen, ...
IEEE Transactions on Information Theory 63 (8), 5011-5038, 2017
852017
Accessible privacy-preserving web-based data analysis for assessing and addressing economic inequalities
A Lapets, F Jansen, KD Albab, R Issa, L Qin, M Varia, A Bestavros
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable …, 2018
712018
EasyUC: Using EasyCrypt to mechanize proofs of universally composable security
R Canetti, A Stoughton, M Varia
2019 IEEE 32nd Computer Security Foundations Symposium (CSF), 167-183, 2019
652019
Secure MPC for analytics as a web application
A Lapets, N Volgushev, A Bestavros, F Jansen, M Varia
2016 IEEE Cybersecurity Development (SecDev), 73-74, 2016
53*2016
Privacy-Preserving Automated Exposure Notification
R Canetti, YT Kalai, A Lysyanskaya, RL Rivest, A Shamir, E Shen, ...
IACR Cryptol. ePrint Arch. 2020, 863, 2020
522020
User-centric distributed solutions for privacy-preserving analytics
A Bestavros, A Lapets, M Varia
Communications of the ACM 60 (2), 37-39, 2017
502017
The PACT protocol specification
RL Rivest, J Callas, R Canetti, K Esvelt, DK Gillmor, YT Kalai, ...
Private Automated Contact Tracing Team, MIT, Cambridge, MA, USA, Tech. Rep. 0.1, 2020
472020
Anonymous collocation discovery: Harnessing privacy to tame the coronavirus
R Canetti, A Trachtenberg, M Varia
arXiv e-prints, arXiv: 2003.13670, 2020
45*2020
Privacy with estimation guarantees
H Wang, L Vo, FP Calmon, M Médard, KR Duffy, M Varia
IEEE Transactions on Information Theory 65 (12), 8025-8042, 2019
452019
Callisto: A cryptographic approach to detecting serial perpetrators of sexual misconduct
A Rajan, L Qin, DW Archer, D Boneh, T Lepoint, M Varia
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable …, 2018
412018
The security of NTP’s datagram protocol
A Malhotra, M Van Gundy, M Varia, H Kennedy, J Gardner, S Goldberg
International Conference on Financial Cryptography and Data Security, 405-423, 2017
392017
Non-malleable obfuscation
R Canetti, M Varia
Theory of Cryptography Conference, 73-90, 2009
382009
Bounds on inference
FP Calmon, M Varia, M Médard, MM Christiansen, KR Duffy, S Tessaro
2013 51st Annual Allerton Conference on Communication, Control, and …, 2013
372013
Secrecy: Secure collaborative analytics in untrusted clouds
J Liagouris, V Kalavri, M Faisal, M Varia
20th USENIX Symposium on Networked Systems Design and Implementation, 2023
36*2023
HEtest: A homomorphic encryption testing framework
M Varia, S Yakoubov, Y Yang
International Conference on Financial Cryptography and Data Security, 213-230, 2015
362015
The system can't perform the operation now. Try again later.
Articles 1–20