Name
Papers
Collaborators
CHARANJIT S. JUTLA
53
47
Citations 
PageRank 
Referers 
1797
187.06
2865
Referees 
References 
501
446
Search Limit
1001000
Title
Citations
PageRank
Year
Improved Stock Market Structure Using Cryptography.00.342022
Secure Storage with Deduplication.00.342022
Inflation-Tracking Proof-of-Work Crypto-Currencies.00.342021
Efficient Searchable Symmetric Encryption for Join Queries.00.342021
Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with Applications.00.342018
Authenticated Encryption Mode IAPM using SHA-3's Public Random Permutation.00.342018
Obfuscation using Tensor Products.00.342018
Improved Structure Preserving Signatures under Standard Bilinear Assumptions.60.412017
Smooth NIZK Arguments with Applications to Asymmetric UC-PAKE.00.342016
Weak Ideal Functionalities for Designing Random Oracles with Applications to Fugue.00.342015
Dual-System Simulation-Soundness with Applications to UC-PAKE and More.00.342015
Upending Stock Market Structure Using Secure Multi-Party Computation.10.342015
Private Database Access With HE-over-ORAM Architecture.170.582015
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation.00.342014
The Hash Function "Fugue".00.342014
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries.2205.962013
Switching Lemma for Bilinear Tests and Constant-Size NIZK Proofs for Linear Subspaces.170.572013
Optimizing ORAM and Using it Efficiently for Secure Computation.741.892013
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces501.232013
PayTree: "Amortized Signature" for Flexible Micro-Payments.294.802012
Decision Procedures for Simulatability.20.362012
On the Circuit Complexity of Composite Galois Field Transformations.00.342012
Universally Composable Security Analysis of OAuth v2.0.201.062011
A Completeness Theorem for Pseudo-Linear Functions with Applications to UC Security10.352010
Provably Good Codes for Hash Function Design40.802009
Encryption Modes with Almost Free Message Integrity12330.352008
Utility Sampling for Trust Metrics in PKI.00.342007
PRF domain extension using DAGs90.712006
A Simple Biased Distribution for Dinur's Construction00.342006
A Simple and Provably Good Code for SHA Message Expansion80.752005
Is SHA-1 conceptually sound?40.462005
A Matching Lower Bound on the Minimum Weight of SHA-1 Expansion Code80.732005
Testing Low-Degree Polynomials over Prime Fields321.382004
Lower Bound on Linear Authenticated Encryption00.342003
Scream: A Software-Efficient Stream Cipher312.812002
Parallelizable Authentication Trees160.952002
Tight Lower Bound on Linear Authenticated Encryption.11.702002
Cryptanalysis of Stream Ciphers with Linear Masking666.082002
On model checking for the µ-calculus and its fragments200.982001
Efficient Rijndael Encryption Implementation with Composite Field Arithmetic10016.532001
IBM Comments00.342000
Secure distributed storage and retrieval536.092000
The Complexity of Tree Automata and Logics of Programs17918.371999
Towards Sound Approaches to Counteract Power-Analysis Attacks32740.001999
On Finding Small Solutions of Modular Multivariate Polynomial Equations162.941998
Generalized Birthday Arracks on Unbalanced Feistel Networks120.791998
Determinization and memoryless winning strategies60.801997
A Methodology for Designing Proof Rules for Fair Parallel Programs10.351997
On Model-Checking for Fragments of µ-Calculus14611.511993
Finding extremal sets in less than quadratic time151.321993
  • 1
  • 2