Shelat, Abhi
39  results:
Search for persons X
?
1

Threshold BBS+ Signatures for Distributed Anonymous Credent..:

, In: 2023 IEEE Symposium on Security and Privacy (SP),
Doerner, Jack ; Kondi, Yashvanth ; Lee, Eysa.. - p. 773-789 , 2023
 
?
 
?
4

Improved Straight-Line Extraction in the Random Oracle Mode..:

, In: Advances in Cryptology – ASIACRYPT 2022; Lecture Notes in Computer Science,
Kondi, Yashvanth ; Shelat, Abhi - p. 279-309 , 2022
 
?
5

Guaranteed Output in $$O(\sqrt{n})$$ Rounds for Round-Robin..:

, In: Advances in Cryptology – EUROCRYPT 2022; Lecture Notes in Computer Science,
Cohen, Ran ; Doerner, Jack ; Kondi, Yashvanth. - p. 241-271 , 2022
 
?
6

Diogenes: Lightweight Scalable RSA Modulus Generation with ..:

, In: 2021 IEEE Symposium on Security and Privacy (SP),
Chen, Megan ; Hazay, Carmit ; Ishai, Yuval... - p. 590-607 , 2021
 
?
7

Going Beyond Dual Execution: MPC for Functions with Efficie..:

, In: Lecture Notes in Computer Science; Public-Key Cryptography – PKC 2020,
 
?
8

Multiparty Generation of an RSA Modulus:

, In: Advances in Cryptology – CRYPTO 2020; Lecture Notes in Computer Science,
Chen, Megan ; Cohen, Ran ; Doerner, Jack... - p. 64-93 , 2020
 
?
9

Adaptively Secure MPC with Sublinear Communication Complexi..:

, In: Advances in Cryptology – CRYPTO 2019; Lecture Notes in Computer Science,
Cohen, Ran ; Shelat, Abhi ; Wichs, Daniel - p. 30-60 , 2019
 
?
10

Securely Sampling Biased Coins with Applications to Differe..:

, In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security,
 
?
11

Minimizing Trust in Hardware Wallets with Two Factor Signat..:

, In: Financial Cryptography and Data Security; Lecture Notes in Computer Science,
Marcedone, Antonio ; Pass, Rafael ; Shelat, Abhi - p. 407-425 , 2019
 
?
12

Blind Certificate Authorities:

, In: 2019 IEEE Symposium on Security and Privacy (SP),
Wang, Liang ; Asharov, Gilad ; Pass, Rafael.. - p. 1015-1032 , 2019
 
?
13

A Better Method to Analyze Blockchain Consistency:

, In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security,
 
?
15

Scaling ORAM for Secure Computation:

, In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security,
Doerner, Jack ; Shelat, Abhi - p. 523-535 , 2017
 
1-15