Name
Papers
Collaborators
AKSHAYARAM SRINIVASAN
32
33
Citations 
PageRank 
Referers 
111
12.08
153
Referees 
References 
285
381
Search Limit
100285
Title
Citations
PageRank
Year
Bounded Indistinguishability for Simple Sources.00.342022
Round-Optimal Black-Box Secure Computation from Two-Round Malicious OT.00.342022
Fully-Secure MPC with Minimal Trust.00.342022
SNARGs for P from Sub-exponential DDH and QR.00.342022
Non-Black-Box Approach to Secure Two-Party Computation in Three Rounds.00.342022
Round-Optimal Black-Box Protocol Compilers.00.342022
On the Round Complexity of Black-box Secure MPC.00.342021
Improved Computational Extractors and their Applications.00.342021
Multi-Source Non-Malleable Extractors and Applications.00.342020
Separating Two-Round Secure Computation From Oblivious Transfer.00.342020
Delphi: A Cryptographic Inference System for Neural Networks00.342020
Leakage Resilient Secret Sharing and Applications20.362019
Nearly Optimal Robust Secret Sharing against Rushing Adversaries.00.342019
Unconditionally Secure Computation Against Low-Complexity Leakage.00.342019
Two-Round Multiparty Secure Computation from Minimal Assumptions.110.442018
Round Optimal Black-Box “Commit-and-Prove”.00.342018
Two-Round Multiparty Secure Computation Minimizing Public Key Operations.00.342018
Adaptively Secure Garbling with Near Optimal Online Complexity.30.372018
Revisiting Non-Malleable Secret Sharing.20.362018
Adaptive Garbled RAM from Laconic Oblivious Transfer.00.342018
A Simple Construction Of Io For Turing Machines20.352018
Efficiently Obfuscating Re-Encryption Program under DDH Assumption.00.342017
Garbled Protocols and Two-Round MPC from Bilinear Maps70.402017
Breaking the Sub-Exponential Barrier in Obfustopia.180.542017
Obfuscation without the Vulnerabilities of Multilinear Maps.00.342016
Secure Obfuscation in a Weak Multilinear Map Model.280.682016
Unifying Security Notions of Functional Encryption.30.382016
Single-Key to Multi-Key Functional Encryption with Polynomial Loss.100.452016
Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium.180.542016
On the Exact Cryptographic Hardness of Finding a Nash Equilibrium.40.402015
Certificateless Proxy Re-Encryption Without Pairing: Revisited30.392015
Certificateless Proxy Re-Encryption Without Pairing.00.342014