BibTeX records: Dakshita Khurana

download as .bib file

@inproceedings{DBLP:conf/asiacrypt/KhuranaMT23,
  author       = {Dakshita Khurana and
                  Giulio Malavolta and
                  Kabir Tomer},
  editor       = {Jian Guo and
                  Ron Steinfeld},
  title        = {Weak Zero-Knowledge via the Goldreich-Levin Theorem},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Guangzhou, China, December 4-8, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14439},
  pages        = {142--173},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-8724-5\_5},
  doi          = {10.1007/978-981-99-8724-5\_5},
  timestamp    = {Sun, 07 Jan 2024 14:24:23 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KhuranaMT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BartusekKP22,
  author       = {James Bartusek and
                  Dakshita Khurana and
                  Alexander Poremba},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Publicly-Verifiable Deletion via Target-Collapsing Functions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {99--128},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_4},
  doi          = {10.1007/978-3-031-38554-4\_4},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BartusekKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BartusekK22,
  author       = {James Bartusek and
                  Dakshita Khurana},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Cryptography with Certified Deletion},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {192--223},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_7},
  doi          = {10.1007/978-3-031-38554-4\_7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BartusekK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BartusekKS22,
  author       = {James Bartusek and
                  Dakshita Khurana and
                  Akshayaram Srinivasan},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Secure Computation with Shared {EPR} Pairs (Or: How to Teleport in
                  Zero-Knowledge)},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14085},
  pages        = {224--257},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38554-4\_8},
  doi          = {10.1007/978-3-031-38554-4\_8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BartusekKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKSS23,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  editor       = {Helena Handschuh and
                  Anna Lysyanskaya},
  title        = {Round-Optimal Black-Box {MPC} in the Plain Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2023 - 43rd Annual International
                  Cryptology Conference, {CRYPTO} 2023, Santa Barbara, CA, USA, August
                  20-24, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14081},
  pages        = {393--426},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-38557-5\_13},
  doi          = {10.1007/978-3-031-38557-5\_13},
  timestamp    = {Mon, 14 Aug 2023 16:16:25 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/IshaiKSS23,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Black-Box Reusable {NISC} with Random Oracles},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14005},
  pages        = {68--97},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30617-4\_3},
  doi          = {10.1007/978-3-031-30617-4\_3},
  timestamp    = {Thu, 20 Apr 2023 11:35:01 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/IshaiKSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GargKLW23,
  author       = {Rachit Garg and
                  Dakshita Khurana and
                  George Lu and
                  Brent Waters},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {On Non-uniform Security for Black-Box Non-interactive {CCA} Commitments},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14004},
  pages        = {173--204},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30545-0\_7},
  doi          = {10.1007/978-3-031-30545-0\_7},
  timestamp    = {Thu, 20 Apr 2023 11:35:01 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GargKLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AgarwalBKK23,
  author       = {Amit Agarwal and
                  James Bartusek and
                  Dakshita Khurana and
                  Nishant Kumar},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {A New Framework for Quantum Oblivious Transfer},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14004},
  pages        = {363--394},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30545-0\_13},
  doi          = {10.1007/978-3-031-30545-0\_13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AgarwalBKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AgarwalAKRR23,
  author       = {Amit Agarwal and
                  Navid Alamati and
                  Dakshita Khurana and
                  Srinivasan Raghuraman and
                  Peter Rindal},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {On Black-Box Verifiable Outsourcing},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14369},
  pages        = {158--187},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48615-9\_6},
  doi          = {10.1007/978-3-031-48615-9\_6},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AgarwalAKRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BartusekKMPW23,
  author       = {James Bartusek and
                  Dakshita Khurana and
                  Giulio Malavolta and
                  Alexander Poremba and
                  Michael Walter},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Weakening Assumptions for Publicly-Verifiable Deletion},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14372},
  pages        = {183--197},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48624-1\_7},
  doi          = {10.1007/978-3-031-48624-1\_7},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BartusekKMPW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2303-08676,
  author       = {James Bartusek and
                  Dakshita Khurana and
                  Alexander Poremba},
  title        = {Publicly-Verifiable Deletion via Target-Collapsing Functions},
  journal      = {CoRR},
  volume       = {abs/2303.08676},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2303.08676},
  doi          = {10.48550/ARXIV.2303.08676},
  eprinttype    = {arXiv},
  eprint       = {2303.08676},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2303-08676.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-09846,
  author       = {James Bartusek and
                  Dakshita Khurana and
                  Giulio Malavolta and
                  Alexander Poremba and
                  Michael Walter},
  title        = {Weakening Assumptions for Publicly-Verifiable Deletion},
  journal      = {CoRR},
  volume       = {abs/2304.09846},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.09846},
  doi          = {10.48550/ARXIV.2304.09846},
  eprinttype    = {arXiv},
  eprint       = {2304.09846},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-09846.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-10480,
  author       = {James Bartusek and
                  Dakshita Khurana and
                  Akshayaram Srinivasan},
  title        = {Secure Computation with Shared {EPR} Pairs (Or: How to Teleport in
                  Zero-Knowledge)},
  journal      = {CoRR},
  volume       = {abs/2304.10480},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.10480},
  doi          = {10.48550/ARXIV.2304.10480},
  eprinttype    = {arXiv},
  eprint       = {2304.10480},
  timestamp    = {Wed, 26 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-10480.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-07118,
  author       = {Ruta Jawale and
                  Dakshita Khurana},
  title        = {Unclonable Non-Interactive Zero-Knowledge},
  journal      = {CoRR},
  volume       = {abs/2310.07118},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.07118},
  doi          = {10.48550/ARXIV.2310.07118},
  eprinttype    = {arXiv},
  eprint       = {2310.07118},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-07118.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-11526,
  author       = {Dakshita Khurana and
                  Kabir Tomer},
  title        = {Commitments from Quantum One-Wayness},
  journal      = {CoRR},
  volume       = {abs/2310.11526},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.11526},
  doi          = {10.48550/ARXIV.2310.11526},
  eprinttype    = {arXiv},
  eprint       = {2310.11526},
  timestamp    = {Tue, 31 Oct 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-11526.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartusekGGKMRR23,
  author       = {James Bartusek and
                  Sanjam Garg and
                  Vipul Goyal and
                  Dakshita Khurana and
                  Giulio Malavolta and
                  Justin Raizes and
                  Bhaskar Roberts},
  title        = {Obfuscation and Outsourced Computation with Certified Deletion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/265},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BartusekGGKMRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartusekKP23,
  author       = {James Bartusek and
                  Dakshita Khurana and
                  Alexander Poremba},
  title        = {Publicly-Verifiable Deletion via Target-Collapsing Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {370},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/370},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartusekKP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKSS23,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  title        = {Black-Box Reusable {NISC} with Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {514},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/514},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartusekKMPW23,
  author       = {James Bartusek and
                  Dakshita Khurana and
                  Giulio Malavolta and
                  Alexander Poremba and
                  Michael Walter},
  title        = {Weakening Assumptions for Publicly-Verifiable Deletion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {559},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/559},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartusekKMPW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartusekKS23,
  author       = {James Bartusek and
                  Dakshita Khurana and
                  Akshayaram Srinivasan},
  title        = {Secure Computation with Shared {EPR} Pairs (Or: How to Teleport in
                  Zero-Knowledge)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {564},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/564},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartusekKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKSS23a,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  title        = {Round-Optimal Black-Box {MPC} in the Plain Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1173},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1173},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKSS23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgarwalAKRR23,
  author       = {Amit Agarwal and
                  Navid Alamati and
                  Dakshita Khurana and
                  Srinivasan Raghuraman and
                  Peter Rindal},
  title        = {On Black-Box Verifiable Outsourcing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1466},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1466},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgarwalAKRR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JawaleK23,
  author       = {Ruta Jawale and
                  Dakshita Khurana},
  title        = {Unclonable Non-Interactive Zero-Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1532},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1532},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/JawaleK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhuranaT23,
  author       = {Dakshita Khurana and
                  Kabir Tomer},
  title        = {Commitments from Quantum One-Wayness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1620},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1620},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KhuranaT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/BadrinarayananI22,
  author       = {Saikrishna Badrinarayanan and
                  Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Daniel Wichs},
  editor       = {Dana Dachman{-}Soled},
  title        = {Refuting the Dream {XOR} Lemma via Ideal Obfuscation and Resettable
                  {MPC}},
  booktitle    = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022,
                  July 5-7, 2022, Cambridge, MA, {USA}},
  series       = {LIPIcs},
  volume       = {230},
  pages        = {10:1--10:21},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2022.10},
  doi          = {10.4230/LIPICS.ITC.2022.10},
  timestamp    = {Thu, 30 Jun 2022 16:13:48 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/BadrinarayananI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/IshaiKSS22,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Round-Optimal Black-Box Protocol Compilers},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13275},
  pages        = {210--240},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06944-4\_8},
  doi          = {10.1007/978-3-031-06944-4\_8},
  timestamp    = {Tue, 31 May 2022 17:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/IshaiKSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HulettJKS22,
  author       = {James Hulett and
                  Ruta Jawale and
                  Dakshita Khurana and
                  Akshayaram Srinivasan},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {SNARGs for {P} from Sub-exponential {DDH} and {QR}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13276},
  pages        = {520--549},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07085-3\_18},
  doi          = {10.1007/978-3-031-07085-3\_18},
  timestamp    = {Tue, 31 May 2022 17:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HulettJKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CanettiCKKPP22,
  author       = {Ran Canetti and
                  Suvradip Chakraborty and
                  Dakshita Khurana and
                  Nishant Kumar and
                  Oxana Poburinnaya and
                  Manoj Prabhakaran},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {COA-Secure Obfuscation and Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13275},
  pages        = {731--758},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06944-4\_25},
  doi          = {10.1007/978-3-031-06944-4\_25},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/CanettiCKKPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/IshaiKSS22,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Round-Optimal Black-Box Secure Computation from Two-Round Malicious
                  {OT}},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13748},
  pages        = {441--469},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22365-5\_16},
  doi          = {10.1007/978-3-031-22365-5\_16},
  timestamp    = {Fri, 23 Dec 2022 17:47:38 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/IshaiKSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-01754,
  author       = {James Bartusek and
                  Dakshita Khurana},
  title        = {Cryptography with Certified Deletion},
  journal      = {CoRR},
  volume       = {abs/2207.01754},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.01754},
  doi          = {10.48550/ARXIV.2207.01754},
  eprinttype    = {arXiv},
  eprint       = {2207.01754},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-01754.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-04520,
  author       = {Amit Agarwal and
                  James Bartusek and
                  Dakshita Khurana and
                  Nishant Kumar},
  title        = {A New Framework for Quantum Oblivious Transfer},
  journal      = {CoRR},
  volume       = {abs/2209.04520},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.04520},
  doi          = {10.48550/ARXIV.2209.04520},
  eprinttype    = {arXiv},
  eprint       = {2209.04520},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-04520.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HulettJKS22,
  author       = {James Hulett and
                  Ruta Jawale and
                  Dakshita Khurana and
                  Akshayaram Srinivasan},
  title        = {SNARGs for {P} from Sub-exponential {DDH} and {QR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {353},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/353},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HulettJKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananI22,
  author       = {Saikrishna Badrinarayanan and
                  Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Daniel Wichs},
  title        = {Refuting the Dream {XOR} Lemma via Ideal Obfuscation and Resettable
                  {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {681},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/681},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKSS22,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  title        = {Round-Optimal Black-Box Protocol Compilers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {887},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/887},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001KLW22,
  author       = {Rachit Garg and
                  Dakshita Khurana and
                  George Lu and
                  Brent Waters},
  title        = {On Non-uniform Security for Black-box Non-Interactive {CCA} Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1032},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1032},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001KLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartusekK22,
  author       = {James Bartusek and
                  Dakshita Khurana},
  title        = {Cryptography with Certified Deletion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1178},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1178},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BartusekK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgarwalBK022,
  author       = {Amit Agarwal and
                  James Bartusek and
                  Dakshita Khurana and
                  Nishant Kumar},
  title        = {A New Framework for Quantum Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1191},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1191},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgarwalBK022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKSS22a,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  title        = {Round-Optimal Black-Box Secure Computation from Two-Round Malicious
                  {OT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1288},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1288},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKSS22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiCKKPP22,
  author       = {Ran Canetti and
                  Suvradip Chakraborty and
                  Dakshita Khurana and
                  Nishant Kumar and
                  Oxana Poburinnaya and
                  Manoj Prabhakaran},
  title        = {COA-Secure Obfuscation and Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1781},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1781},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiCKKPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IshaiKSS21,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {On the Round Complexity of Black-Box Secure {MPC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12826},
  pages        = {214--243},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84245-1\_8},
  doi          = {10.1007/978-3-030-84245-1\_8},
  timestamp    = {Mon, 16 Aug 2021 09:08:14 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IshaiKSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChatterjeeGHKLM21,
  author       = {Rohit Chatterjee and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Dakshita Khurana and
                  Xiao Liang and
                  Giulio Malavolta and
                  Omkant Pandey and
                  Sina Shiehian},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Compact Ring Signatures from Learning with Errors},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {282--312},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_11},
  doi          = {10.1007/978-3-030-84242-0\_11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/ChatterjeeGHKLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BartusekCKM21,
  author       = {James Bartusek and
                  Andrea Coladangelo and
                  Dakshita Khurana and
                  Fermi Ma},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {On the Round Complexity of Secure Quantum Computation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {406--435},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_15},
  doi          = {10.1007/978-3-030-84242-0\_15},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BartusekCKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BartusekCKM21a,
  author       = {James Bartusek and
                  Andrea Coladangelo and
                  Dakshita Khurana and
                  Fermi Ma},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {One-Way Functions Imply Secure Computation in a Quantum World},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12825},
  pages        = {467--496},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84242-0\_17},
  doi          = {10.1007/978-3-030-84242-0\_17},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/BartusekCKM21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KhuranaS21,
  author       = {Dakshita Khurana and
                  Akshayaram Srinivasan},
  editor       = {Tal Malkin and
                  Chris Peikert},
  title        = {Improved Computational Extractors and Their Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2021 - 41st Annual International
                  Cryptology Conference, {CRYPTO} 2021, Virtual Event, August 16-20,
                  2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12827},
  pages        = {566--594},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-84252-9\_19},
  doi          = {10.1007/978-3-030-84252-9\_19},
  timestamp    = {Mon, 16 Aug 2021 09:08:12 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KhuranaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GargKLW21,
  author       = {Rachit Garg and
                  Dakshita Khurana and
                  George Lu and
                  Brent Waters},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Black-Box Non-interactive Non-malleable Commitments},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12698},
  pages        = {159--185},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77883-5\_6},
  doi          = {10.1007/978-3-030-77883-5\_6},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GargKLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Khurana21,
  author       = {Dakshita Khurana},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Non-interactive Distributional Indistinguishability {(NIDI)} and Non-malleable
                  Commitments},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12698},
  pages        = {186--215},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77883-5\_7},
  doi          = {10.1007/978-3-030-77883-5\_7},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Khurana21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AgarwalBGKM21,
  author       = {Amit Agarwal and
                  James Bartusek and
                  Vipul Goyal and
                  Dakshita Khurana and
                  Giulio Malavolta},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Post-Quantum Multi-Party Computation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12696},
  pages        = {435--464},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77870-5\_16},
  doi          = {10.1007/978-3-030-77870-5\_16},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AgarwalBGKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KhuranaW21,
  author       = {Dakshita Khurana and
                  Brent Waters},
  editor       = {Juan A. Garay},
  title        = {On the {CCA} Compatibility of Public-Key Infrastructure},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12711},
  pages        = {235--260},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75248-4\_9},
  doi          = {10.1007/978-3-030-75248-4\_9},
  timestamp    = {Fri, 07 May 2021 15:40:46 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KhuranaW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/JawaleKKZ21,
  author       = {Ruta Jawale and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Rachel Yun Zhang},
  editor       = {Samir Khuller and
                  Virginia Vassilevska Williams},
  title        = {SNARGs for bounded depth computations and {PPAD} hardness from sub-exponential
                  {LWE}},
  booktitle    = {{STOC} '21: 53rd Annual {ACM} {SIGACT} Symposium on Theory of Computing,
                  Virtual Event, Italy, June 21-25, 2021},
  pages        = {708--721},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3406325.3451055},
  doi          = {10.1145/3406325.3451055},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/JawaleKKZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AgarwalBGKM21,
  author       = {Amit Agarwal and
                  James Bartusek and
                  Vipul Goyal and
                  Dakshita Khurana and
                  Giulio Malavolta},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Two-Round Maliciously Secure Computation with Super-Polynomial Simulation},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13042},
  pages        = {654--685},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90459-3\_22},
  doi          = {10.1007/978-3-030-90459-3\_22},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AgarwalBGKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhuranaW21,
  author       = {Dakshita Khurana and
                  Brent Waters},
  title        = {On the {CCA} Compatibility of Public-Key Infrastructure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {271},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/271},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhuranaW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChatterjeeGHKLM21,
  author       = {Rohit Chatterjee and
                  Sanjam Garg and
                  Mohammad Hajiabadi and
                  Dakshita Khurana and
                  Xiao Liang and
                  Giulio Malavolta and
                  Omkant Pandey and
                  Sina Shiehian},
  title        = {Compact Ring Signatures from Learning With Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {942},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/942},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChatterjeeGHKLM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgarwalBGKM21,
  author       = {Amit Agarwal and
                  James Bartusek and
                  Vipul Goyal and
                  Dakshita Khurana and
                  Giulio Malavolta},
  title        = {Two-Round Maliciously Secure Computation with Super-Polynomial Simulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1230},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1230},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgarwalBGKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhuranaS21,
  author       = {Dakshita Khurana and
                  Akshayaram Srinivasan},
  title        = {Improved Computational Extractors and their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1336},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1336},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KhuranaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Khurana21,
  author       = {Dakshita Khurana},
  title        = {Non-interactive Distributional Indistinguishability {(NIDI)} and Non-Malleable
                  Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1404},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1404},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Khurana21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshaiKSS21,
  author       = {Yuval Ishai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Akshayaram Srinivasan},
  title        = {On the Round Complexity of Black-box Secure {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1467},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1467},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/IshaiKSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GargKK20,
  author       = {Ankit Garg and
                  Yael Tauman Kalai and
                  Dakshita Khurana},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Low Error Efficient Computational Extractors in the {CRS} Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12105},
  pages        = {373--402},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45721-1\_14},
  doi          = {10.1007/978-3-030-45721-1\_14},
  timestamp    = {Mon, 04 May 2020 14:27:11 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GargKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BadrinarayananF20,
  author       = {Saikrishna Badrinarayanan and
                  Rex Fernando and
                  Aayush Jain and
                  Dakshita Khurana and
                  Amit Sahai},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Statistical {ZAP} Arguments},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12107},
  pages        = {642--667},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45727-3\_22},
  doi          = {10.1007/978-3-030-45727-3\_22},
  timestamp    = {Tue, 05 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BadrinarayananF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KhuranaM20,
  author       = {Dakshita Khurana and
                  Muhammad Haris Mughees},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {On Statistical Security in Two-Party Computation},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12551},
  pages        = {532--561},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64378-2\_19},
  doi          = {10.1007/978-3-030-64378-2\_19},
  timestamp    = {Tue, 15 Dec 2020 12:01:12 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/KhuranaM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-12904,
  author       = {Amit Agarwal and
                  James Bartusek and
                  Vipul Goyal and
                  Dakshita Khurana and
                  Giulio Malavolta},
  title        = {Post-Quantum Multi-Party Computation in Constant Rounds},
  journal      = {CoRR},
  volume       = {abs/2005.12904},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.12904},
  eprinttype    = {arXiv},
  eprint       = {2005.12904},
  timestamp    = {Fri, 29 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-12904.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-11212,
  author       = {James Bartusek and
                  Andrea Coladangelo and
                  Dakshita Khurana and
                  Fermi Ma},
  title        = {On The Round Complexity of Two-Party Quantum Computation},
  journal      = {CoRR},
  volume       = {abs/2011.11212},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.11212},
  eprinttype    = {arXiv},
  eprint       = {2011.11212},
  timestamp    = {Thu, 26 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-11212.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-13486,
  author       = {James Bartusek and
                  Andrea Coladangelo and
                  Dakshita Khurana and
                  Fermi Ma},
  title        = {One-Way Functions Imply Secure Computation in a Quantum World},
  journal      = {CoRR},
  volume       = {abs/2011.13486},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.13486},
  eprinttype    = {arXiv},
  eprint       = {2011.13486},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-13486.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JawaleK20,
  author       = {Ruta Jawale and
                  Dakshita Khurana},
  title        = {Lossy Correlation Intractability and {PPAD} Hardness from Sub-exponential
                  {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {911},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/911},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JawaleK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JawaleKKZ20,
  author       = {Ruta Jawale and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Rachel Yun Zhang},
  title        = {SNARGs for Bounded Depth Computations and {PPAD} Hardness from Sub-Exponential
                  {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {980},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/980},
  timestamp    = {Wed, 10 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/JawaleKKZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargKLW20,
  author       = {Rachit Garg and
                  Dakshita Khurana and
                  George Lu and
                  Brent Waters},
  title        = {Black-Box Non-Interactive Non-Malleable Commitments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1197},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1197},
  timestamp    = {Tue, 15 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GargKLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgarwalBGKM20,
  author       = {Amit Agarwal and
                  James Bartusek and
                  Vipul Goyal and
                  Dakshita Khurana and
                  Giulio Malavolta},
  title        = {Post-Quantum Multi-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1395},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1395},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AgarwalBGKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhuranaM20,
  author       = {Dakshita Khurana and
                  Muhammad Haris Mughees},
  title        = {On Statistical Security in Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1428},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1428},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KhuranaM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartusekCKM20,
  author       = {James Bartusek and
                  Andrea Coladangelo and
                  Dakshita Khurana and
                  Fermi Ma},
  title        = {On The Round Complexity of Two-Party Quantum Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1471},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1471},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BartusekCKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartusekCKM20a,
  author       = {James Bartusek and
                  Andrea Coladangelo and
                  Dakshita Khurana and
                  Fermi Ma},
  title        = {One-Way Functions Imply Secure Computation in a Quantum World},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1487},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1487},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BartusekCKM20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KalaiK19,
  author       = {Yael Tauman Kalai and
                  Dakshita Khurana},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Non-interactive Non-malleability from Quantum Supremacy},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {552--582},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_18},
  doi          = {10.1007/978-3-030-26954-8\_18},
  timestamp    = {Fri, 09 Aug 2019 14:27:02 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KalaiK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BitanskyKP19,
  author       = {Nir Bitansky and
                  Dakshita Khurana and
                  Omer Paneth},
  editor       = {Moses Charikar and
                  Edith Cohen},
  title        = {Weak zero-knowledge beyond the black-box barrier},
  booktitle    = {Proceedings of the 51st Annual {ACM} {SIGACT} Symposium on Theory
                  of Computing, {STOC} 2019, Phoenix, AZ, USA, June 23-26, 2019},
  pages        = {1091--1102},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3313276.3316382},
  doi          = {10.1145/3313276.3316382},
  timestamp    = {Sat, 22 Jun 2019 17:42:26 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/BitanskyKP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayanFJK19,
  author       = {Saikrishna Badrinarayanan and
                  Rex Fernando and
                  Aayush Jain and
                  Dakshita Khurana and
                  Amit Sahai},
  title        = {Statistical {ZAP} Arguments},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {780},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/780},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayanFJK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargKK19,
  author       = {Ankit Garg and
                  Yael Tauman Kalai and
                  Dakshita Khurana},
  title        = {Computational Extractors with Negligible Error in the {CRS} Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1116},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Khurana18,
  author       = {Dakshita Khurana},
  title        = {How to Rewind with Minimal Interaction},
  school       = {University of California, Los Angeles, {USA}},
  year         = {2018},
  url          = {http://www.escholarship.org/uc/item/53s2w021},
  timestamp    = {Tue, 23 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Khurana18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BadrinarayananG18,
  author       = {Saikrishna Badrinarayanan and
                  Vipul Goyal and
                  Abhishek Jain and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Amit Sahai},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Promise Zero Knowledge and Its Applications to Round Optimal {MPC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {459--487},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_16},
  doi          = {10.1007/978-3-319-96881-0\_16},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/BadrinarayananG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KalaiKS18,
  author       = {Yael Tauman Kalai and
                  Dakshita Khurana and
                  Amit Sahai},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Statistical Witness Indistinguishability (and more) in Two Messages},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10822},
  pages        = {34--65},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78372-7\_2},
  doi          = {10.1007/978-3-319-78372-7\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KalaiKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BadrinarayananK18,
  author       = {Saikrishna Badrinarayanan and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Daniel Wichs},
  editor       = {Ilias Diakonikolas and
                  David Kempe and
                  Monika Henzinger},
  title        = {Succinct delegation for low-space non-deterministic computation},
  booktitle    = {Proceedings of the 50th Annual {ACM} {SIGACT} Symposium on Theory
                  of Computing, {STOC} 2018, Los Angeles, CA, USA, June 25-29, 2018},
  pages        = {709--721},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3188745.3188924},
  doi          = {10.1145/3188745.3188924},
  timestamp    = {Wed, 21 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/BadrinarayananK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KhuranaOS18,
  author       = {Dakshita Khurana and
                  Rafail Ostrovsky and
                  Akshayaram Srinivasan},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Round Optimal Black-Box "Commit-and-Prove"},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {286--313},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_11},
  doi          = {10.1007/978-3-030-03807-6\_11},
  timestamp    = {Sat, 09 Apr 2022 12:44:08 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/KhuranaOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BadrinarayananK18,
  author       = {Saikrishna Badrinarayanan and
                  Dakshita Khurana and
                  Amit Sahai and
                  Brent Waters},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Upgrading to Functional Encryption},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11239},
  pages        = {629--658},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03807-6\_23},
  doi          = {10.1007/978-3-030-03807-6\_23},
  timestamp    = {Mon, 05 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/BadrinarayananK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/BadrinarayananK18,
  author       = {Saikrishna Badrinarayanan and
                  Yael Kalai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Daniel Wichs},
  title        = {Non-Interactive Delegation for Low-Space Non-Deterministic Computation},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR18-009}},
  year         = {2018},
  url          = {https://eccc.weizmann.ac.il/report/2018/009},
  eprinttype    = {ECCC},
  eprint       = {TR18-009},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/BadrinarayananK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/KalaiK18,
  author       = {Yael Kalai and
                  Dakshita Khurana},
  title        = {Non-Interactive Non-Malleability from Quantum Supremacy},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR18-203}},
  year         = {2018},
  url          = {https://eccc.weizmann.ac.il/report/2018/203},
  eprinttype    = {ECCC},
  eprint       = {TR18-203},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/KalaiK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiKS18,
  author       = {Yael Tauman Kalai and
                  Dakshita Khurana and
                  Amit Sahai},
  title        = {Statistical Witness Indistinguishability (and more) in Two Messages},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {168},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/168},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananK18,
  author       = {Saikrishna Badrinarayanan and
                  Dakshita Khurana and
                  Amit Sahai and
                  Brent Waters},
  title        = {Upgrading to Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {281},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/281},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthJKS18,
  author       = {Prabhanjan Ananth and
                  Aayush Jain and
                  Dakshita Khurana and
                  Amit Sahai},
  title        = {Indistinguishability Obfuscation Without Multilinear Maps: iO from
                  LWE, Bilinear Maps, and Weak Pseudorandomness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {615},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/615},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthJKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhuranaOS18,
  author       = {Dakshita Khurana and
                  Rafail Ostrovsky and
                  Akshayaram Srinivasan},
  title        = {Round Optimal Black-Box {\textquotedblleft}Commit-and-Prove{\textquotedblright}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {921},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/921},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhuranaOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KalaiK18,
  author       = {Yael Tauman Kalai and
                  Dakshita Khurana},
  title        = {Non-Interactive Non-Malleability from Quantum Supremacy},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1118},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1118},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KalaiK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0002KKR17,
  author       = {Abhishek Jain and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Ron Rothblum},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Distinguisher-Dependent Simulation in Two Rounds and its Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {158--189},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_6},
  doi          = {10.1007/978-3-319-63715-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/0002KKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BadrinarayananK17,
  author       = {Saikrishna Badrinarayanan and
                  Dakshita Khurana and
                  Rafail Ostrovsky and
                  Ivan Visconti},
  editor       = {Jean{-}S{\'{e}}bastien Coron and
                  Jesper Buus Nielsen},
  title        = {Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2017 - 36th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Paris, France, April 30 - May 4, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10210},
  pages        = {382--411},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-56620-7\_14},
  doi          = {10.1007/978-3-319-56620-7\_14},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BadrinarayananK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/KhuranaS17,
  author       = {Dakshita Khurana and
                  Amit Sahai},
  editor       = {Chris Umans},
  title        = {How to Achieve Non-Malleability in One or Two Rounds},
  booktitle    = {58th {IEEE} Annual Symposium on Foundations of Computer Science, {FOCS}
                  2017, Berkeley, CA, USA, October 15-17, 2017},
  pages        = {564--575},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/FOCS.2017.58},
  doi          = {10.1109/FOCS.2017.58},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/KhuranaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Khurana17,
  author       = {Dakshita Khurana},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Round Optimal Concurrent Non-malleability from Polynomial Hardness},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10678},
  pages        = {139--171},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70503-3\_5},
  doi          = {10.1007/978-3-319-70503-3\_5},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Khurana17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BadrinarayananG17,
  author       = {Saikrishna Badrinarayanan and
                  Vipul Goyal and
                  Abhishek Jain and
                  Dakshita Khurana and
                  Amit Sahai},
  editor       = {Yael Kalai and
                  Leonid Reyzin},
  title        = {Round Optimal Concurrent {MPC} via Strong Simulation},
  booktitle    = {Theory of Cryptography - 15th International Conference, {TCC} 2017,
                  Baltimore, MD, USA, November 12-15, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10677},
  pages        = {743--775},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70500-2\_25},
  doi          = {10.1007/978-3-319-70500-2\_25},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BadrinarayananG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/KhuranaS17,
  author       = {Dakshita Khurana and
                  Amit Sahai},
  title        = {How to Achieve Non-Malleability in One or Two Rounds},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR17-100}},
  year         = {2017},
  url          = {https://eccc.weizmann.ac.il/report/2017/100},
  eprinttype    = {ECCC},
  eprint       = {TR17-100},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/KhuranaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhuranaS17,
  author       = {Dakshita Khurana and
                  Amit Sahai},
  title        = {Two-Message Non-Malleable Commitments from Standard Sub-exponential
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {291},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/291},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhuranaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JainKKR17,
  author       = {Abhishek Jain and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Ron Rothblum},
  title        = {Distinguisher-Dependent Simulation in Two Rounds and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {330},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/330},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JainKKR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananG17b,
  author       = {Saikrishna Badrinarayanan and
                  Vipul Goyal and
                  Abhishek Jain and
                  Dakshita Khurana and
                  Amit Sahai},
  title        = {Round Optimal Concurrent {MPC} via Strong Simulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {597},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/597},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananG17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Khurana17,
  author       = {Dakshita Khurana},
  title        = {Round Optimal Concurrent Non-Malleability from Polynomial Hardness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {734},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/734},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Khurana17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananG17c,
  author       = {Saikrishna Badrinarayanan and
                  Vipul Goyal and
                  Abhishek Jain and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Amit Sahai},
  title        = {Promise Zero Knowledge and its Applications to Round Optimal {MPC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1088},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1088},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananG17c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananK17,
  author       = {Saikrishna Badrinarayanan and
                  Yael Tauman Kalai and
                  Dakshita Khurana and
                  Amit Sahai and
                  Daniel Wichs},
  title        = {Non-Interactive Delegation for Low-Space Non-Deterministic Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1250},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HofheinzJKSWZ16,
  author       = {Dennis Hofheinz and
                  Tibor Jager and
                  Dakshita Khurana and
                  Amit Sahai and
                  Brent Waters and
                  Mark Zhandry},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {How to Generate and Use Universal Samplers},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {715--744},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_24},
  doi          = {10.1007/978-3-662-53890-6\_24},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HofheinzJKSWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KhuranaMS16,
  author       = {Dakshita Khurana and
                  Hemanta K. Maji and
                  Amit Sahai},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Secure Computation from Elastic Noisy Channels},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {184--212},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_7},
  doi          = {10.1007/978-3-662-49896-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KhuranaMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KhuranaKMPS16,
  author       = {Dakshita Khurana and
                  Daniel Kraschewski and
                  Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Amit Sahai},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {All Complete Functionalities are Reversible},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {213--242},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_8},
  doi          = {10.1007/978-3-662-49896-5\_8},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KhuranaKMPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/GoyalKS16,
  author       = {Vipul Goyal and
                  Dakshita Khurana and
                  Amit Sahai},
  editor       = {Irit Dinur},
  title        = {Breaking the Three Round Barrier for Non-malleable Commitments},
  booktitle    = {{IEEE} 57th Annual Symposium on Foundations of Computer Science, {FOCS}
                  2016, 9-11 October 2016, Hyatt Regency, New Brunswick, New Jersey,
                  {USA}},
  pages        = {21--30},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/FOCS.2016.12},
  doi          = {10.1109/FOCS.2016.12},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/GoyalKS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/GoyalKMPS16,
  author       = {Vipul Goyal and
                  Dakshita Khurana and
                  Ilya Mironov and
                  Omkant Pandey and
                  Amit Sahai},
  editor       = {Ioannis Chatzigiannakis and
                  Michael Mitzenmacher and
                  Yuval Rabani and
                  Davide Sangiorgi},
  title        = {Do Distributed Differentially-Private Protocols Require Oblivious
                  Transfer?},
  booktitle    = {43rd International Colloquium on Automata, Languages, and Programming,
                  {ICALP} 2016, July 11-15, 2016, Rome, Italy},
  series       = {LIPIcs},
  volume       = {55},
  pages        = {29:1--29:15},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2016},
  url          = {https://doi.org/10.4230/LIPIcs.ICALP.2016.29},
  doi          = {10.4230/LIPICS.ICALP.2016.29},
  timestamp    = {Tue, 11 Feb 2020 15:52:14 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/GoyalKMPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KraschewskiKMPS16,
  author       = {Daniel Kraschewski and
                  Dakshita Khurana and
                  Hemanta K. Maji and
                  Manoj Prabhakaran and
                  Amit Sahai},
  title        = {All Complete Functionalities are Reversible},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {496},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/496},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KraschewskiKMPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhuranaMS16,
  author       = {Dakshita Khurana and
                  Hemanta K. Maji and
                  Amit Sahai},
  title        = {Secure Computation from Elastic Noisy Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {497},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/497},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhuranaMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BadrinarayananK16,
  author       = {Saikrishna Badrinarayanan and
                  Dakshita Khurana and
                  Rafail Ostrovsky and
                  Ivan Visconti},
  title        = {New Feasibility Results in Unconditional UC-Secure Computation with
                  (Malicious) PUFs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {636},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/636},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BadrinarayananK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KhuranaRS15,
  author       = {Dakshita Khurana and
                  Vanishree Rao and
                  Amit Sahai},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Multi-party Key Exchange for Unbounded Parties from Indistinguishability
                  Obfuscation},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {52--75},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_3},
  doi          = {10.1007/978-3-662-48797-6\_3},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KhuranaRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/AgrawalIKP15,
  author       = {Shweta Agrawal and
                  Yuval Ishai and
                  Dakshita Khurana and
                  Anat Paskin{-}Cherniavsky},
  editor       = {Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Kazuo Iwama and
                  Naoki Kobayashi and
                  Bettina Speckmann},
  title        = {Statistical Randomized Encodings: {A} Complexity Theoretic View},
  booktitle    = {Automata, Languages, and Programming - 42nd International Colloquium,
                  {ICALP} 2015, Kyoto, Japan, July 6-10, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9134},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47672-7\_1},
  doi          = {10.1007/978-3-662-47672-7\_1},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/AgrawalIKP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalKMPS15,
  author       = {Vipul Goyal and
                  Dakshita Khurana and
                  Ilya Mironov and
                  Omkant Pandey and
                  Amit Sahai},
  title        = {Do Distributed Differentially-Private Protocols Require Oblivious
                  Transfer?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1090},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalKMPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GoyalJK15,
  author       = {Vipul Goyal and
                  Aayush Jain and
                  Dakshita Khurana},
  title        = {Witness Signatures and Non-Malleable Multi-Prover Zero-Knowledge Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1095},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GoyalJK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KhuranaMS14,
  author       = {Dakshita Khurana and
                  Hemanta K. Maji and
                  Amit Sahai},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Black-Box Separations for Differentially Private Protocols},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8874},
  pages        = {386--405},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45608-8\_21},
  doi          = {10.1007/978-3-662-45608-8\_21},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KhuranaMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhuranaSW14,
  author       = {Dakshita Khurana and
                  Amit Sahai and
                  Brent Waters},
  title        = {How to Generate and use Universal Parameters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {507},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/507},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhuranaSW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KhuranaMS14,
  author       = {Dakshita Khurana and
                  Hemanta K. Maji and
                  Amit Sahai},
  title        = {Black Box Separations for Differentially Private Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {957},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/957},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KhuranaMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icvgip/KhuranaSSVKB12,
  author       = {Dakshita Khurana and
                  Surabhi Sankhla and
                  Abhinav Shukla and
                  Richa Varshney and
                  Prem Kalra and
                  Subhashis Banerjee},
  editor       = {Bill Triggs and
                  Kavita Bala and
                  Sharat Chandran},
  title        = {A grammar-based {GUI} for single view reconstruction},
  booktitle    = {The Eighth Indian Conference on Vision, Graphics and Image Processing,
                  {ICVGIP} '12, Mumbai, India, December 16-19, 2012},
  pages        = {14},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2425333.2425347},
  doi          = {10.1145/2425333.2425347},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icvgip/KhuranaSSVKB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/KhuranaG11,
  author       = {Dakshita Khurana and
                  Aditya Gaurav},
  title        = {Ensuring tight computational security against higher-order {DPA} attacks},
  booktitle    = {Ninth Annual Conference on Privacy, Security and Trust, {PST} 2011,
                  19-21 July, 2011, Montreal, Qu{\'{e}}bec, Canada},
  pages        = {96--101},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/PST.2011.5971970},
  doi          = {10.1109/PST.2011.5971970},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/KhuranaG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics