Name
Papers
Collaborators
PRABHANJAN ANANTH
41
52
Citations 
PageRank 
Referers 
234
18.43
338
Referees 
References 
437
619
Search Limit
100437
Title
Citations
PageRank
Year
A Note on Copy-Protection from Random Oracles.00.342022
On the Feasibility of Unclonable Encryption, and More.00.342022
Post-Quantum Zero-Knowledge with Space-Bounded Simulation.00.342022
Collusion-Resistant Functional Encryption for RAMs.00.342022
Cryptography from Pseudorandom Quantum States.00.342021
Multiparty Homomorphic Encryption (or: On Removing Setup in Multi-Key FHE).00.342020
Multikey FHE in the Plain Model.00.342020
Towards Efficiency-Preserving Round Compression in MPC - Do Fewer Rounds Mean More Computation?00.342020
Indistinguishability Obfuscation Without Multilinear Maps: New Paradigms via Low Degree Weak Pseudorandomness and Security Amplification.20.362019
Fully Homomorphic NIZK and NIWI Proofs.00.342019
Two Round Information-Theoretic MPC with Malicious Security.00.342018
Private Circuits: A Modular Approach.30.402018
Indistinguishability Obfuscation Without Multilinear Maps: iO from LWE, Bilinear Maps, and Weak Pseudorandomness.00.342018
Succinct Garbling Schemes From Functional Encryption Through A Local Simulation Paradigm00.342018
Attribute Based Encryption for RAMs from LWE.00.342018
Round-Optimal Secure Multiparty Computation with Honest Majority.10.342018
Indistinguishability Obfuscation for Turing Machines: Constant Overhead and Amortization.10.342017
On Secure Two-Party Computation in Three Rounds.10.352017
A New Approach to Round-Optimal Secure Multiparty Computation.90.462017
Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation From Degree-5 Multilinear Maps.210.582017
Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption.30.362017
Patchable Indistinguishability Obfuscation: iO for Evolving Software.00.342017
Cryptography with Updates.00.342017
Universal Obfuscation and Witness Encryption: Boosting Correctness and Combining Security.50.402016
Delegating RAM Computations with Adaptive Soundness and Privacy.130.502016
Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption.70.422016
Achieving Compactness Generically: Indistinguishability Obfuscation from Non-Compact Functional Encryption.160.552015
From Selective To Adaptive Security In Functional Encryption430.992015
Indistinguishability Obfuscation with Constant Size Overhead.10.352015
Patchable Obfuscation.00.342015
Interactive Proofs under Continual Memory Leakage.90.482014
The Trojan Method in Functional Encryption: From Selective to Adaptive Security, Generically.70.472014
Optimizing Obfuscation: Avoiding Barrington's Theorem491.342014
Differing-Inputs Obfuscation and Applications.160.662013
On the (in)security of fischlin’s paradigm10.352013
Lower Bounds in the Hardware Token Model.10.352013
Non Observability in the Random Oracle Model70.482012
An algebraic characterization of rainbow connectivity00.342011
Rainbow Connectivity: Hardness and Tractability.120.792011
Hardness and Parameterized Algorithms on Rainbow Connectivity problem10.452011
New Hardness Results in Rainbow Connectivity50.942011