Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Vanishree Rao
@inproceedings{DBLP:conf/itasec/Rao22, author = {Vanishree Rao}, editor = {Maurizio Pizzonia and Andrea Vitaletti}, title = {Mina - {A} Blockchain in its True Sense}, booktitle = {Proceedings of the 4th Workshop on Distributed Ledger Technology co-located with the Italian Conference on Cybersecurity 2022 {(ITASEC} 2022), Rome, Italy, June 20, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3166}, publisher = {CEUR-WS.org}, year = {2022}, timestamp = {Fri, 10 Mar 2023 16:22:11 +0100}, biburl = {https://dblp.org/rec/conf/itasec/Rao22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rao22, author = {Vanishree Rao}, title = {Paras - {A} Private {NFT} Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {976}, year = {2022}, url = {https://eprint.iacr.org/2022/976}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rao22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonneauMRS20, author = {Joseph Bonneau and Izaak Meckler and Vanishree Rao and Evan Shapiro}, title = {Coda: Decentralized Cryptocurrency at Scale}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2020}, url = {https://eprint.iacr.org/2020/352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonneauMRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-00832, author = {Vanishree Rao and Yunhui Long and Hoda Eldardiry and Shantanu Rane and Ryan A. Rossi and Frank Torres}, title = {Secure Two-Party Feature Selection}, journal = {CoRR}, volume = {abs/1901.00832}, year = {2019}, url = {http://arxiv.org/abs/1901.00832}, eprinttype = {arXiv}, eprint = {1901.00832}, timestamp = {Thu, 31 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-00832.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/BindschaedlerRB17, author = {Vincent Bindschaedler and Shantanu Rane and Alejandro E. Brito and Vanishree Rao and Ersin Uzun}, editor = {Gail{-}Joon Ahn and Alexander Pretschner and Gabriel Ghinita}, title = {Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks}, booktitle = {Proceedings of the Seventh {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24, 2017}, pages = {115--125}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3029806.3029829}, doi = {10.1145/3029806.3029829}, timestamp = {Wed, 16 Sep 2020 11:48:10 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/BindschaedlerRB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DamgardPR16, author = {Ivan Damg{\aa}rd and Antigoni Polychroniadou and Vanishree Rao}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {Adaptively Secure Multi-Party Computation from {LWE} (via Equivocal {FHE)}}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {208--233}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_9}, doi = {10.1007/978-3-662-49387-8\_9}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DamgardPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/HofheinzRW16, author = {Dennis Hofheinz and Vanishree Rao and Daniel Wichs}, editor = {Martin Hirt and Adam D. Smith}, title = {Standard Security Does Not Imply Indistinguishability Under Selective Opening}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {121--145}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_5}, doi = {10.1007/978-3-662-53644-5\_5}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/HofheinzRW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/HanumanthaRao15, author = {Vanishree Rao}, title = {Adaptively-secure Multiparty Non-interactive Key Exchange}, school = {University of California, Los Angeles, {USA}}, year = {2015}, url = {http://www.escholarship.org/uc/item/55g8v0ws}, timestamp = {Thu, 11 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/HanumanthaRao15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KhuranaRS15, author = {Dakshita Khurana and Vanishree Rao and Amit Sahai}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Multi-party Key Exchange for Unbounded Parties from Indistinguishability Obfuscation}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {52--75}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_3}, doi = {10.1007/978-3-662-48797-6\_3}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KhuranaRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Dachman-SoledKR15, author = {Dana Dachman{-}Soled and Jonathan Katz and Vanishree Rao}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {Adaptively Secure, Universally Composable, Multiparty Computation in Constant Rounds}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9015}, pages = {586--613}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46497-7\_23}, doi = {10.1007/978-3-662-46497-7\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Dachman-SoledKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HofheinzRW15, author = {Dennis Hofheinz and Vanishree Rao and Daniel Wichs}, title = {Standard Security Does Not Imply Indistinguishability Under Selective Opening}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {792}, year = {2015}, url = {http://eprint.iacr.org/2015/792}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HofheinzRW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FuchsbauerKPR14, author = {Georg Fuchsbauer and Momchil Konstantinov and Krzysztof Pietrzak and Vanishree Rao}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Adaptive Security of Constrained PRFs}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8874}, pages = {82--101}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45608-8\_5}, doi = {10.1007/978-3-662-45608-8\_5}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FuchsbauerKPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/OstrovskyRV14, author = {Rafail Ostrovsky and Vanishree Rao and Ivan Visconti}, editor = {Michel Abdalla and Roberto De Prisco}, title = {On Selective-Opening Attacks against Encryption Schemes}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {578--597}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_33}, doi = {10.1007/978-3-319-10879-7\_33}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/OstrovskyRV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/OrlandiORSV14, author = {Claudio Orlandi and Rafail Ostrovsky and Vanishree Rao and Amit Sahai and Ivan Visconti}, editor = {Yehuda Lindell}, title = {Statistical Concurrent Non-malleable Zero Knowledge}, booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC} 2014, San Diego, CA, USA, February 24-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8349}, pages = {167--191}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54242-8\_8}, doi = {10.1007/978-3-642-54242-8\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/OrlandiORSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OrlandiORSV14, author = {Claudio Orlandi and Rafail Ostrovsky and Vanishree Rao and Amit Sahai and Ivan Visconti}, title = {Statistical Concurrent Non-Malleable Zero Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {143}, year = {2014}, url = {http://eprint.iacr.org/2014/143}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OrlandiORSV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FuchsbauerKPR14, author = {Georg Fuchsbauer and Momchil Konstantinov and Krzysztof Pietrzak and Vanishree Rao}, title = {Adaptive Security of Constrained PRFs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {416}, year = {2014}, url = {http://eprint.iacr.org/2014/416}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FuchsbauerKPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DamgaardPR14, author = {Ivan Damg{\aa}rd and Antigoni Polychroniadou and Vanishree Rao}, title = {Adaptively Secure {UC} Constant Round Multi-Party Computation Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {830}, year = {2014}, url = {http://eprint.iacr.org/2014/830}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DamgaardPR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Dachman-SoledKR14, author = {Dana Dachman{-}Soled and Jonathan Katz and Vanishree Rao}, title = {Adaptively Secure, Universally Composable, Multi-Party Computation in Constant Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {858}, year = {2014}, url = {http://eprint.iacr.org/2014/858}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Dachman-SoledKR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Rao14, author = {Vanishree Rao}, title = {Adaptive Multiparty Non-interactive Key Exchange Without Setup In The Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {910}, year = {2014}, url = {http://eprint.iacr.org/2014/910}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Rao14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issta/MishraRCRJM13, author = {Atit Mishra and Manjunatha Rao and Chethan CU and Vanishree Rao and Yogananda V. Jeppu and Nagaraj Murthy}, editor = {Gabriella Carrozza and Roberto Pietrantuono and Vittorio Manetti}, title = {An auto-review tool for model-based testing of safety-critical systems}, booktitle = {Proceedings of the 2013 International Workshop on Joining AcadeMiA and Industry Contributions to testing Automation, {JAMAICA} 2013, Lugano, Switzerland, July 15, 2013}, pages = {47--52}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2489280.2489294}, doi = {10.1145/2489280.2489294}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issta/MishraRCRJM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AnanthBGR13, author = {Prabhanjan Ananth and Raghav Bhaskar and Vipul Goyal and Vanishree Rao}, editor = {Amit Sahai}, title = {On the (In)security of Fischlin's Paradigm}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {202--221}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_12}, doi = {10.1007/978-3-642-36594-2\_12}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AnanthBGR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/OstrovskyRSV13, author = {Rafail Ostrovsky and Vanishree Rao and Alessandra Scafuro and Ivan Visconti}, editor = {Amit Sahai}, title = {Revisiting Lower and Upper Bounds for Selective Decommitments}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {559--578}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_31}, doi = {10.1007/978-3-642-36594-2\_31}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/OstrovskyRSV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthBGR12, author = {Prabhanjan Ananth and Raghav Bhaskar and Vipul Goyal and Vanishree Rao}, title = {On the (In)security of Fischlin's Paradigm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {721}, year = {2012}, url = {http://eprint.iacr.org/2012/721}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthBGR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GargRSSU11, author = {Sanjam Garg and Vanishree Rao and Amit Sahai and Dominique Schr{\"{o}}der and Dominique Unruh}, editor = {Phillip Rogaway}, title = {Round Optimal Blind Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {630--648}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_36}, doi = {10.1007/978-3-642-22792-9\_36}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GargRSSU11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GoyalOR11, author = {Vipul Goyal and Adam O'Neill and Vanishree Rao}, editor = {Yuval Ishai}, title = {Correlated-Input Secure Hash Functions}, booktitle = {Theory of Cryptography - 8th Theory of Cryptography Conference, {TCC} 2011, Providence, RI, USA, March 28-30, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6597}, pages = {182--200}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19571-6\_12}, doi = {10.1007/978-3-642-19571-6\_12}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/GoyalOR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GoyalOR11, author = {Vipul Goyal and Adam O'Neill and Vanishree Rao}, title = {Correlated-Input Secure Hash Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {233}, year = {2011}, url = {http://eprint.iacr.org/2011/233}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GoyalOR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OstrovskyRSV11, author = {Rafail Ostrovsky and Vanishree Rao and Alessandra Scafuro and Ivan Visconti}, title = {Revisiting Lower and Upper Bounds for Selective Decommitments}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {536}, year = {2011}, url = {http://eprint.iacr.org/2011/536}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OstrovskyRSV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.