Name
Papers
Collaborators
SAIKRISHNA BADRINARAYANAN
30
58
Citations 
PageRank 
Referers 
63
11.17
159
Referees 
References 
336
248
Search Limit
100336
Title
Citations
PageRank
Year
Efficient and Tight Oblivious Transfer from PKE with Tight Multi-user Security00.342022
Efficient and Tight Oblivious Transfer from PKE with Tight Multi-User Security.00.342022
Updatable Private Set Intersection.00.342022
A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets.00.342022
Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC.00.342022
Secret-Shared Joins with Multiplicity from Aggregation Trees00.342022
Statistical Security in Two-Party Computation Revisited.00.342022
Updatable Private Set Intersection.00.342021
Reusable Two-Round MPC from DDH.00.342020
Secure MPC: Laziness Leads to GOD.00.342020
Statistical ZAP Arguments.00.342019
Promise Zero Knowledge and its Applications to Round Optimal MPC.30.372018
Non-interactive Secure Computation from One-Way Functions.00.342018
Secure MPC: Laziness Leads to GOD.00.342018
Revisiting Non-Malleable Secret Sharing.20.362018
Succinct delegation for low-space non-deterministic computation.00.342018
A note on VRFs from Verifiable Functional Encryption.00.342017
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions.10.352017
Non-Interactive Delegation for Low-Space Non-Deterministic Computation.00.342017
Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs.20.362017
Round Optimal Concurrent MPC via Strong Simulation.30.382017
Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits.200.662016
Verifiable Functional Encryption.40.402016
New Feasibility Results in Unconditional UC-Secure Computation with (Malicious) PUFs.00.342016
Big Data Analytics over Encrypted Datasets with Seabed.100.472016
Post-Zeroizing Obfuscation: The case of Evasive Circuits.00.342015
Multi-Input Functional Encryption for Unbounded Arity Functions.00.342015
Certificateless and Identity based Authenticated Key Exchange Protocols.00.342014
A Revocable Online-Offline Certificateless Signature Scheme without Pairing.00.342013
Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results.180.722013