Efficient lattice (H) IBE in the standard model S Agrawal, D Boneh, X Boyen Annual International Conference on the Theory and Applications of …, 2010 | 850 | 2010 |
Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE S Agrawal, D Boneh, X Boyen Annual Cryptology Conference, 98-115, 2010 | 366 | 2010 |
Homomorphic MACs: MAC-based integrity for network coding S Agrawal, D Boneh International Conference on Applied Cryptography and Network Security, 292-305, 2009 | 310 | 2009 |
Functional encryption for inner product predicates from learning with errors S Agrawal, DM Freeman, V Vaikuntanathan International Conference on the Theory and Application of Cryptology and …, 2011 | 208 | 2011 |
Functional encryption: New perspectives and lower bounds S Agrawal, S Gorbunov, V Vaikuntanathan, H Wee Annual Cryptology Conference, 500-518, 2013 | 158 | 2013 |
Fully secure functional encryption for inner products, from standard assumptions S Agrawal, B Libert, D Stehlé Annual International Cryptology Conference, 333-362, 2016 | 147 | 2016 |
Functional encryption for threshold functions (or fuzzy IBE) from lattices S Agrawal, X Boyen, V Vaikuntanathan, P Voulgaris, H Wee International Workshop on Public Key Cryptography, 280-297, 2012 | 127 | 2012 |
Secrecy using compressive sensing S Agrawal, S Vishwanath 2011 IEEE Information Theory Workshop, 563-567, 2011 | 57 | 2011 |
Preventing pollution attacks in multi-source network coding S Agrawal, D Boneh, X Boyen, DM Freeman International Workshop on Public Key Cryptography, 161-176, 2010 | 52 | 2010 |
Function Private Functional Encryption and Property Preserving Encryption: New Definitions and Positive Results. S Agrawal, S Agrawal, S Badrinarayanan, A Kumarasubramanian, ... IACR Cryptol. ePrint Arch. 2013, 744, 2013 | 47 | 2013 |
On continual leakage of discrete log representations S Agrawal, Y Dodis, V Vaikuntanathan, D Wichs International Conference on the Theory and Application of Cryptology and …, 2013 | 39 | 2013 |
Privacy and security of Aadhaar: a computer science perspective SASBS Sharma Economic and Political Weekly, 2017 | 38 | 2017 |
Discrete gaussian leftover hash lemma over infinite domains S Agrawal, C Gentry, S Halevi, A Sahai International Conference on the Theory and Application of Cryptology and …, 2013 | 37 | 2013 |
Adaptive protocols for interactive communication S Agrawal, R Gelles, A Sahai 2016 IEEE International Symposium on Information Theory (ISIT), 595-599, 2016 | 36 | 2016 |
Fuzzy Identity Based Encryption from Lattices. S Agrawal, X Boyen, V Vaikuntanathan, P Voulgaris, H Wee IACR Cryptol. ePrint Arch. 2011, 414, 2011 | 34 | 2011 |
On the practical security of inner product functional encryption S Agrawal, S Agrawal, S Badrinarayanan, A Kumarasubramanian, ... IACR International Workshop on Public Key Cryptography, 777-798, 2015 | 33 | 2015 |
Identity-based encryption from lattices in the standard model S Agrawal, X Boyen Manuscript, July 3, 2009 | 33 | 2009 |
On the secrecy rate of interference networks using structured codes S Agrawal, S Vishwanath 2009 IEEE International Symposium on Information Theory, 2091-2095, 2009 | 33 | 2009 |
Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation S Agrawal Annual International Conference on the Theory and Applications of …, 2019 | 24 | 2019 |
Efficient public trace and revoke from standard assumptions S Agrawal, S Bhattacherjee, DH Phan, D Stehlé, S Yamada Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 24 | 2017 |