关注
Satrajit ghosh
Satrajit ghosh
在 cse.iitkgp.ac.in 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits
D Escudero, S Ghosh, M Keller, R Rachuri, P Scholl
1452020
An Algebraic Approach to Maliciously Secure Private Set Intersection
S Ghosh, T Nilges
Eurocrypt 2019, 2017
832017
The communication complexity of threshold private set intersection
S Ghosh, M Simkin
Annual International Cryptology Conference, 3-29, 2019
652019
Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead
S Ghosh, JB Nielsen, T Nilges
502017
TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation
N Döttling, S Ghosh, JB Nielsen, T Nilges, R Trifiletti
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
492017
Post-Quantum Forward Secure Onion Routing
S Ghosh, A Kate
24*2015
An improvement of linearization-based algebraic attacks
S Ghosh, A Das
International Conference on Security Aspects in Information Technology, 157-167, 2011
72011
Improved Distributed RSA Key Generation Using the Miller-Rabin Test
J Burkhardt, I Damgård, TK Frederiksen, S Ghosh, C Orlandi
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
62023
Practical non-malleable codes from symmetric-key primitives in 2-split-state model
AK Ghosal, S Ghosh, D Roychowdhury
International Conference on Provable Security, 273-281, 2022
42022
Threshold Private Set Intersection with Better Communication Complexity
S Ghosh, M Simkin
IACR International Conference on Public-Key Cryptography, 251-272, 2023
22023
Improvements of algebraic attacks based on structured gaussian elimination
S Ghosh, A Das
Cryptology ePrint Archive, 2012
22012
Secure Computation Based On Oblivious Linear Function Evaluation
S Ghosh
Aarhus Universitet, 2019
12019
New Variants of Algebraic Attacks Based on Structured Gaussian Elimination
S Ghosh, A Das
2012
系统目前无法执行此操作,请稍后再试。
文章 1–13