Vanishree Rao
Vanishree Rao
Xerox PARC
Bestätigte E-Mail-Adresse bei parc.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Correlated-input secure hash functions
V Goyal, A O’Neill, V Rao
Theory of Cryptography Conference, 182-200, 2011
1112011
Round optimal blind signatures
S Garg, V Rao, A Sahai, D Schröder, D Unruh
Annual Cryptology Conference, 630-648, 2011
542011
Adaptively secure, universally composable, multiparty computation in constant rounds
D Dachman-Soled, J Katz, V Rao
Theory of Cryptography Conference, 586-613, 2015
502015
Adaptive security of constrained PRFs
G Fuchsbauer, M Konstantinov, K Pietrzak, V Rao
International Conference on the Theory and Application of Cryptology and …, 2014
452014
Standard security does not imply indistinguishability under selective opening
D Hofheinz, V Rao, D Wichs
Theory of Cryptography Conference, 121-145, 2016
342016
Achieving differential privacy in secure multiparty data aggregation protocols on star networks
V Bindschaedler, S Rane, AE Brito, V Rao, E Uzun
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
262017
Revisiting lower and upper bounds for selective decommitments
R Ostrovsky, V Rao, A Scafuro, I Visconti
Theory of Cryptography Conference, 559-578, 2013
222013
Adaptively secure multi-party computation from LWE (via equivocal FHE)
I Damgård, A Polychroniadou, V Rao
Public-Key Cryptography--PKC 2016, 208-233, 2016
162016
Multi-party key exchange for unbounded parties from indistinguishability obfuscation
D Khurana, V Rao, A Sahai
International Conference on the Theory and Application of Cryptology and …, 2015
102015
Method for differentially private aggregation in a star topology under a realistic adversarial model
S Rane, V Bindschaedler, AE Brito, E Uzun, V Rao
US Patent 10,223,547, 2019
82019
Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model.
V Rao
IACR Cryptol. ePrint Arch. 2014, 910, 2014
82014
On selective-opening attacks against encryption schemes
R Ostrovsky, V Rao, I Visconti
International Conference on Security and Cryptography for Networks, 578-597, 2014
72014
Statistical concurrent non-malleable zero knowledge
C Orlandi, R Ostrovsky, V Rao, A Sahai, I Visconti
Theory of Cryptography Conference, 167-191, 2014
62014
Adaptively secure uc constant round multi-party computation
I Damgard, A Polychroniadou, V Rao
Cryptology ePrint Archive, Report 2014/845, 2014. http://eprint. iacr. org, 2014
52014
Computer-implemented system and method for protecting sensitive data via data re-encryption
V Rao, S Rane, E Uzun, AE Brito
US Patent 10,277,563, 2019
32019
On the (in) security of Fischlin’s paradigm
P Ananth, R Bhaskar, V Goyal, V Rao
Theory of Cryptography Conference, 202-221, 2013
22013
Adaptively Secure UC Constant Round Multi-Party Computation Protocols.
I Damgård, A Polychroniadou, V Rao
IACR Cryptol. ePrint Arch. 2014, 830, 2014
12014
System and architecture for analytics on encrypted databases
S Rane, V Bindschaedler, AE Brito, E Uzun, V Rao
US Patent 10,846,423, 2020
2020
System and architecture for supporting analytics on encrypted databases
S Rane, V Bindschaedler, AE Brito, E Uzun, V Rao
US Patent 10,783,263, 2020
2020
Secure Two-Party Feature Selection
V Rao, Y Long, H Eldardiry, S Rane, R Rossi, F Torres
arXiv preprint arXiv:1901.00832, 2019
2019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20