Author of the publication

Symmetric Primitives with Structured Secrets.

, , and . CRYPTO (1), volume 11692 of Lecture Notes in Computer Science, page 650-679. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Patranabis, Sikhar
add a person with the name Patranabis, Sikhar
 

Other publications of authors with the same name

BETA: Biometric Enabled Threshold Authentication., , , , and . IACR Cryptol. ePrint Arch., (2020)Fully-Secure MPC with Minimal Trust., , , , and . TCC (2), volume 13748 of Lecture Notes in Computer Science, page 470-501. Springer, (2022)Statistical Security in Two-Party Computation Revisited., , and . TCC (2), volume 13748 of Lecture Notes in Computer Science, page 181-210. Springer, (2022)Cryptographically Secure Multi-tenant Provisioning of FPGAs., , , and . SPACE, volume 12586 of Lecture Notes in Computer Science, page 208-225. Springer, (2020)Compact Key Function Secret Sharing with Non-linear Decoder., , and . IACR Cryptol. ePrint Arch., (2024)Threshold OPRF from Threshold Additive HE., , and . IACR Cryptol. ePrint Arch., (2024)Result Pattern Hiding Searchable Encryption for Conjunctive Queries., , , , , , , , and . CCS, page 745-762. ACM, (2018)Hardware Acceleration of Searchable Encryption., , , and . ACM Conference on Computer and Communications Security, page 2201-2203. ACM, (2018)Physically Related Functions: Exploiting Related Inputs of PUFs for Authenticated-Key Exchange., , , , , and . IEEE Trans. Inf. Forensics Secur., (2022)Dynamic Key-Aggregate Cryptosystem on Elliptic Curves for Online Data Sharing., , and . INDOCRYPT, volume 9462 of Lecture Notes in Computer Science, page 25-44. Springer, (2015)