Follow
Nirvan Tyagi
Nirvan Tyagi
Verified email at cs.washington.edu - Homepage
Title
Cited by
Cited by
Year
Stadium: A distributed metadata-private messaging system
N Tyagi, Y Gilad, D Leung, M Zaharia, N Zeldovich
Proceedings of the 26th Symposium on Operating Systems Principles, 423-440, 2017
1752017
Proofs for inner pairing products and applications
B Bünz, M Maller, P Mishra, N Tyagi, P Vesely
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
1152021
Asymmetric message franking: content moderation for metadata-private end-to-end encryption
N Tyagi, P Grubbs, J Len, I Miers, T Ristenpart
CRYPTO, 222-250, 2019
472019
Energy-efficient algorithms
ED Demaine, J Lynch, GJ Mirano, N Tyagi
Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016
392016
Traceback for end-to-end encrypted messaging
N Tyagi, I Miers, T Ristenpart
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
372019
VeRSA: Verifiable registries with efficient client audits from RSA authenticated dictionaries
N Tyagi, B Fisch, A Zitek, J Bonneau, S Tessaro
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
36*2022
A fast and simple partially oblivious PRF, with applications
N Tyagi, S Celi, T Ristenpart, N Sullivan, S Tessaro, CA Wood
Annual International Conference on the Theory and Applications of …, 2022
32*2022
Mangrove: A scalable framework for folding-based SNARKs
W Nguyen, T Datta, B Chen, N Tyagi, D Boneh
Annual International Cryptology Conference, 308-344, 2024
172024
Bicorn: An optimistically efficient distributed randomness beacon
K Choi, A Arun, N Tyagi, J Bonneau
International Conference on Financial Cryptography and Data Security, 235-251, 2023
172023
BurnBox: Self-Revocable Encryption in a World Of Compelled Access
N Tyagi, MH Mughees, T Ristenpart, I Miers
27th USENIX Security Symposium (USENIX Security 18), 445-461, 2018
152018
Handling adaptive compromise for practical encryption schemes
J Jaeger, N Tyagi
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
142020
Riggs: Decentralized sealed-bid auctions
N Tyagi, A Arun, C Freitag, R Wahby, J Bonneau, D Mazières
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
112023
Toward an energy efficient language and compiler for (partially) reversible algorithms
N Tyagi, J Lynch, ED Demaine
International Conference on Reversible Computation, 121-136, 2016
92016
Muxproofs: Succinct arguments for machine computation from tuple lookups
Z Di, L Xia, W Nguyen, N Tyagi
Cryptology ePrint Archive, 2023
72023
Orca: Blocklisting in {Sender-Anonymous} Messaging
N Tyagi, J Len, I Miers, T Ristenpart
31st USENIX Security Symposium (USENIX Security 22), 2299-2316, 2022
62022
Private Hierarchical Governance for Encrypted Messaging
A Namavari, B Wang, S Menda, B Nassi, N Tyagi, J Grimmelmann, ...
2024 IEEE Symposium on Security and Privacy (SP), 255-255, 2024
2024
Privacy-Preserving Accountability in Online Messaging
N Tyagi
Cornell University, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–17