


Остановите войну!
for scientists:
Aniket Kate
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j15]Donghang Lu, Albert Yu, Aniket Kate, Hemanta K. Maji:
Polymath: Low-Latency MPC via Secure Polynomial Evaluations and Its Applications. Proc. Priv. Enhancing Technol. 2022(1): 396-416 (2022) - [i60]Tiantian Gong, Ryan Henry, Alex Psomas, Aniket Kate:
Relax the Non-Collusion Assumption for Multi-Server PIR. CoRR abs/2201.07740 (2022) - [i59]Christiane Kuhn, Aniket Kate, Thorsten Strufe:
The Danger of Small Anonymity Sets in Privacy-Preserving Payment Systems. CoRR abs/2204.09282 (2022) - [i58]Easwar Vivek Mangipudi, Udit Desai, Mohsen Minaei, Mainack Mondal, Aniket Kate:
Uncovering Impact of Mental Models towards Adoption of Multi-device Crypto-Wallets. IACR Cryptol. ePrint Arch. 2022: 75 (2022) - [i57]Easwar Vivek Mangipudi, Aniket Kate:
D-KODE: Mechanism to Generate and Maintain a Billion Keys. IACR Cryptol. ePrint Arch. 2022: 161 (2022) - [i56]Adithya Bhat, Aniket Kate, Kartik Nayak, Nibesh Shrestha:
OptRand: Optimistically responsive distributed random beacons. IACR Cryptol. ePrint Arch. 2022: 193 (2022) - [i55]Debajyoti Das, Easwar Vivek Mangipudi, Aniket Kate:
OrgAn: Organizational Anonymity with Low Latency. IACR Cryptol. ePrint Arch. 2022: 488 (2022) - 2021
- [c57]Sri Aravinda Krishnan Thyagarajan, Tiantian Gong, Adithya Bhat, Aniket Kate, Dominique Schröder:
OpenSquare: Decentralized Repeated Modular Squaring Service. CCS 2021: 3447-3464 - [c56]Adithya Bhat, Nibesh Shrestha, Zhongtang Luo, Aniket Kate, Kartik Nayak:
RandPiper - Reconfiguration-Friendly Random Beacons with Quadratic Communication. CCS 2021: 3502-3524 - [c55]Sri Aravinda Krishnan Thyagarajan, Adithya Bhat, Bernardo Magri, Daniel Tschudi, Aniket Kate:
Reparo: Publicly Verifiable Layer to Repair Blockchains. Financial Cryptography (2) 2021: 37-56 - [c54]Yuyan Bao, Kirshanthan Sundararajah, Raghav Malik
, Qianchuan Ye, Christopher Wagner, Nouraldin Jaber, Fei Wang, Mohammad Hassan Ameri, Donghang Lu, Alexander Seto, Benjamin Delaware, Roopsha Samanta, Aniket Kate, Christina Garman, Jeremiah Blocki, Pierre-David Letourneau, Benoît Meister
, Jonathan Springer, Tiark Rompf, Milind Kulkarni
:
HACCLE: metaprogramming for secure multi-party computation. GPCE 2021: 130-143 - [c53]Mohsen Minaei, S. Chandra Mouli, Mainack Mondal, Bruno Ribeiro, Aniket Kate:
Deceptive Deletions for Protecting Withdrawn Posts on Social Media Platforms. NDSS 2021 - [c52]Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
Blitz: Secure Multi-Hop Payments Without Two-Phase Commits. USENIX Security Symposium 2021: 4043-4060 - [i54]Easwar Vivek Mangipudi, Donghang Lu, Aniket Kate:
Collusion-Deterrent Threshold Information Escrow. IACR Cryptol. ePrint Arch. 2021: 95 (2021) - [i53]Thomas Yurek, Licheng Luo, Jaiden Fairoze, Aniket Kate, Andrew K. Miller:
hbACSS: How to Robustly Share Many Secrets. IACR Cryptol. ePrint Arch. 2021: 159 (2021) - [i52]Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
Blitz: Secure Multi-Hop Payments Without Two-Phase Commits. IACR Cryptol. ePrint Arch. 2021: 176 (2021) - [i51]Adithya Bhat, Akhil Bandarupalli, Saurabh Bagchi, Aniket Kate, Michael Reiter:
Apollo - Optimistically Linear and Responsive SMR. IACR Cryptol. ePrint Arch. 2021: 180 (2021) - [i50]Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei:
Donner: UTXO-Based Virtual Channels Across Multiple Hops. IACR Cryptol. ePrint Arch. 2021: 855 (2021) - [i49]Donghang Lu, Albert Yu, Aniket Kate, Hemanta K. Maji:
Polymath: Low-Latency MPC via Secure Polynomial Evaluations and its Applications. IACR Cryptol. ePrint Arch. 2021: 978 (2021) - [i48]Sri Aravinda Krishnan Thyagarajan, Tiantian Gong, Adithya Bhat, Aniket Kate, Dominique Schröder:
OpenSquare: Decentralized Repeated Modular Squaring Service. IACR Cryptol. ePrint Arch. 2021: 1273 (2021) - [i47]Nibesh Shrestha, Adithya Bhat, Aniket Kate, Kartik Nayak:
Synchronous Distributed Key Generation without Broadcasts. IACR Cryptol. ePrint Arch. 2021: 1635 (2021) - [i46]Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Divide and Funnel: a Scaling Technique for Mix-Networks. IACR Cryptol. ePrint Arch. 2021: 1685 (2021) - 2020
- [j14]Duc Viet Le, Lizzy Tengana Hurtado, Adil Ahmad, Mohsen Minaei, Byoungyoung Lee, Aniket Kate:
A Tale of Two Trees: One Writes, and Other Reads. Proc. Priv. Enhancing Technol. 2020(2): 519-536 (2020) - [j13]Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Comprehensive Anonymity Trilemma: User Coordination is not enough. Proc. Priv. Enhancing Technol. 2020(3): 356-383 (2020) - [j12]Mohsen Minaei, Pedro Moreno-Sanchez
, Aniket Kate:
MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies. Proc. Priv. Enhancing Technol. 2020(3): 404-424 (2020) - [c51]Sri Aravinda Krishnan Thyagarajan, Adithya Bhat, Giulio Malavolta, Nico Döttling, Aniket Kate, Dominique Schröder:
Verifiable Timed Signatures Made Practical. CCS 2020: 1733-1750 - [c50]Pedro Moreno-Sanchez
, Arthur Blue, Duc Viet Le, Sarang Noether, Brandon Goodell, Aniket Kate:
DLSAG: Non-interactive Refund Transactions for Interoperable Payment Channels in Monero. Financial Cryptography 2020: 325-345 - [c49]Venkat Arun, Aniket Kate, Deepak Garg, Peter Druschel, Bobby Bhattacharjee:
Finding Safety in Numbers with Secure Allegation Escrows. NDSS 2020 - [i45]Sri Aravinda Krishnan Thyagarajan, Adithya Bhat, Bernardo Magri, Daniel Tschudi, Aniket Kate:
Reparo: Publicly Verifiable Layer to Repair Blockchains. CoRR abs/2001.00486 (2020) - [i44]Mohsen Minaei, S. Chandra Mouli, Mainack Mondal, Bruno Ribeiro, Aniket Kate:
Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms. CoRR abs/2005.14113 (2020) - [i43]Tiantian Gong, Mohsen Minaei, Wenhai Sun, Aniket Kate:
Undercutting Bitcoin Is Not Profitable. CoRR abs/2007.11480 (2020) - [i42]Mohsen Minaei, Mainack Mondal, Aniket Kate:
"My Friend Wanted to Talk About It and I Didn't": Understanding Perceptions of Deletion Privacy in Social Platforms. CoRR abs/2008.11317 (2020) - [i41]Yuyan Bao, Kirshanthan Sundararajah, Raghav Malik, Qianchuan Ye, Christopher Wagner, Fei Wang, Mohammad Hassan Ameri, Donghang Lu, Alexander Seto, Benjamin Delaware, Roopsha Samanta, Aniket Kate, Christina Garman, Jeremiah Blocki, Pierre-David Letourneau, Benoît Meister, Jonathan Springer, Tiark Rompf, Milind Kulkarni:
HACCLE: An Ecosystem for Building Secure Multi-Party Computations. CoRR abs/2009.01489 (2020) - [i40]Sri Aravinda Krishnan Thyagarajan, Adithya Bhat, Giulio Malavolta, Nico Döttling, Aniket Kate, Dominique Schröder:
Verifiable Timed Signatures Made Practical. IACR Cryptol. ePrint Arch. 2020: 1563 (2020) - [i39]Adithya Bhat, Nibesh Shrestha, Aniket Kate, Kartik Nayak:
RandPiper - Reconfiguration-Friendly Random Beacons with Quadratic Communication. IACR Cryptol. ePrint Arch. 2020: 1590 (2020)
2010 – 2019
- 2019
- [j11]Mohsen Minaei, Mainack Mondal, Patrick Loiseau, Krishna P. Gummadi, Aniket Kate:
Lethe: Conceal Content Deletion from Persistent Observers. Proc. Priv. Enhancing Technol. 2019(1): 206-226 (2019) - [c48]Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Aniket Kate, Andrew K. Miller:
HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication. CCS 2019: 887-903 - [c47]Donghang Lu, Pedro Moreno-Sanchez
, Amanuel Zeryihun, Shivam Bajpayi, Sihao Yin, Ken Feldman, Jason Kosofsky, Pramita Mitra, Aniket Kate:
Reducing Automotive Counterfeiting Using Blockchain: Benefits and Challenges. DAPPCON 2019: 39-48 - [c46]Duc Viet Le, Mahimna Kelkar, Aniket Kate:
Flexible Signatures: Making Authentication Suitable for Real-Time Environments. ESORICS (1) 2019: 173-193 - [c45]Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate:
Towards Automatically Penalizing Multimedia Breaches (Extended Abstract). EuroS&P Workshops 2019: 340-346 - [c44]Sze Yiu Chau, Moosa Yahyazadeh, Omar Chowdhury, Aniket Kate, Ninghui Li:
Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification. NDSS 2019 - [c43]Giulio Malavolta, Pedro Moreno-Sanchez
, Clara Schneidewind, Aniket Kate, Matteo Maffei:
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability. NDSS 2019 - [c42]Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup. Public Key Cryptography (1) 2019: 286-313 - [i38]Aniket Kate, Andrew K. Miller, Tom Yurek:
Brief Note: Asynchronous Verifiable Secret Sharing with Optimal Resilience and Linear Amortized Overhead. CoRR abs/1902.06095 (2019) - [i37]Duc Viet Le, Lizzy Tengana Hurtado, Adil Ahmad, Mohsen Minaei, Byoungyoung Lee, Aniket Kate:
A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains. CoRR abs/1909.01531 (2019) - [i36]Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, Srivatsan Ravi:
Concurrency and Privacy with Payment-Channel Networks. CoRR abs/1911.09148 (2019) - [i35]Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup. IACR Cryptol. ePrint Arch. 2019: 63 (2019) - [i34]Pedro Moreno-Sanchez
, RandomRun, Duc Viet Le, Sarang Noether, Brandon Goodell, Aniket Kate:
DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero. IACR Cryptol. ePrint Arch. 2019: 595 (2019) - [i33]Donghang Lu, Thomas Yurek, Samarth Kulshreshtha, Rahul Govind, Rahul Mahadev, Aniket Kate, Andrew K. Miller:
HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication. IACR Cryptol. ePrint Arch. 2019: 883 (2019) - 2018
- [j10]Pedro Moreno-Sanchez
, Uzair Mahmood, Aniket Kate:
ClearChart: Ensuring integrity of consumer ratings in online marketplaces. Comput. Secur. 78: 90-102 (2018) - [j9]Ryan Henry, Amir Herzberg, Aniket Kate:
Blockchain Access Privacy: Challenges and Directions. IEEE Secur. Priv. 16(4): 38-45 (2018) - [c41]Sze Yiu Chau
, Bincheng Wang, Jianxiong Wang, Omar Chowdhury, Aniket Kate, Ninghui Li:
Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps. ACSAC 2018: 236-251 - [c40]Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg:
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. NDSS 2018 - [c39]Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two. IEEE Symposium on Security and Privacy 2018: 108-126 - [c38]Pedro Moreno-Sanchez
, Navin Modi, Raghuvir Songhela, Aniket Kate, Sonia Fahmy
:
Mind Your Credit: Assessing the Health of the Ripple Credit Network. WWW 2018: 329-338 - [i32]Venkat Arun, Aniket Kate, Deepak Garg, Peter Druschel, Bobby Bhattacharjee:
SATE: Robust and Private Allegation Escrows. CoRR abs/1810.10123 (2018) - [i31]Duc Viet Le, Mahimna Kelkar, Aniket Kate:
Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments. IACR Cryptol. ePrint Arch. 2018: 343 (2018) - [i30]Mohsen Minaei, Pedro Moreno-Sanchez
, Aniket Kate:
R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies. IACR Cryptol. ePrint Arch. 2018: 454 (2018) - [i29]Giulio Malavolta, Pedro Moreno-Sanchez
, Clara Schneidewind, Aniket Kate, Matteo Maffei:
Multi-Hop Locks for Secure, Privacy-Preserving and Interoperable Payment-Channel Networks. IACR Cryptol. ePrint Arch. 2018: 472 (2018) - [i28]Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate:
Automated Penalization of Data Breaches using Crypto-augmented Smart Contracts. IACR Cryptol. ePrint Arch. 2018: 1050 (2018) - 2017
- [j8]Mainack Mondal, Johnnatan Messias
, Saptarshi Ghosh, Krishna P. Gummadi, Aniket Kate:
Longitudinal Privacy Management in Social Media: The Need for Better Controls. IEEE Internet Comput. 21(3): 48-55 (2017) - [j7]Pedro Moreno-Sanchez
, Tim Ruffing
, Aniket Kate:
PathShuffle: Credit Mixing and Anonymous Payments for Ripple. Proc. Priv. Enhancing Technol. 2017(3): 110 (2017) - [c37]David Chaum, Debajyoti Das, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter
, Alan T. Sherman:
cMix: Mixing with Minimal Real-Time Asymmetric Cryptographic Operations. ACNS 2017: 557-578 - [c36]Giulio Malavolta, Pedro Moreno-Sanchez
, Aniket Kate, Matteo Maffei, Srivatsan Ravi:
Concurrency and Privacy with Payment-Channel Networks. CCS 2017: 455-471 - [c35]Giulio Malavolta, Pedro Moreno-Sanchez
, Aniket Kate, Matteo Maffei:
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. NDSS 2017 - [c34]Tim Ruffing, Pedro Moreno-Sanchez
, Aniket Kate:
P2P Mixing and Unlinkable Bitcoin Transactions. NDSS 2017 - [c33]Sze Yiu Chau
, Omar Chowdhury, Md. Endadul Hoque, Huangyi Ge, Aniket Kate, Cristina Nita-Rotaru, Ninghui Li:
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations. IEEE Symposium on Security and Privacy 2017: 503-520 - [i27]Pedro Moreno-Sanchez, Navin Modi, Raghuvir Songhela, Aniket Kate, Sonia Fahmy:
Mind Your Credit: Assessing the Health of the Ripple Credit Network. CoRR abs/1706.02358 (2017) - [i26]Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, Ian Goldberg:
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. CoRR abs/1709.05748 (2017) - [i25]Mohsen Minaei, Mainack Mondal, Patrick Loiseau, Krishna P. Gummadi, Aniket Kate:
Forgetting the Forgotten with Letheia, Concealing Content Deletion from Persistent Observers. CoRR abs/1710.11271 (2017) - [i24]Sanjit Chatterjee, Deepak Garg, Aniket Kate, Tobias Theobald:
Encrypting Messages for Incomplete Chains of Certificates. IACR Cryptol. ePrint Arch. 2017: 777 (2017) - [i23]Giulio Malavolta, Pedro Moreno-Sanchez
, Aniket Kate, Matteo Maffei, Srivatsan Ravi:
Concurrency and Privacy with Payment-Channel Networks. IACR Cryptol. ePrint Arch. 2017: 820 (2017) - [i22]Debajyoti Das, Sebastian Meiser, Esfandiar Mohammadi, Aniket Kate:
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two. IACR Cryptol. ePrint Arch. 2017: 954 (2017) - 2016
- [j6]Michael Backes, Aniket Kate, Praveen Manoharan
, Sebastian Meiser, Esfandiar Mohammadi:
AnoA: A Framework for Analyzing Anonymous Communication Protocols. J. Priv. Confidentiality 7(2) (2016) - [j5]Pedro Moreno-Sanchez
, Muhammad Bilal Zafar, Aniket Kate:
Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network. Proc. Priv. Enhancing Technol. 2016(4): 436-453 (2016) - [j4]Michael Backes, Niklas Grimm, Aniket Kate:
Data Lineage in Malicious Environments. IEEE Trans. Dependable Secur. Comput. 13(2): 178-191 (2016) - [c32]Aniket Kate:
Introduction to Credit Networks: Security, Privacy, and Applications. CCS 2016: 1859-1860 - [c31]Michael Backes, Amir Herzberg
, Aniket Kate, Ivan Pryvalov:
Anonymous RAM. ESORICS (1) 2016: 344-362 - [c30]Mainack Mondal, Johnnatan Messias, Saptarshi Ghosh, Krishna P. Gummadi, Aniket Kate:
Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data. SOUPS 2016: 287-299 - [i21]David Chaum, Farid Javani, Aniket Kate, Anna Krasnova, Joeri de Ruiter, Alan T. Sherman:
cMix: Anonymization byHigh-Performance Scalable Mixing. IACR Cryptol. ePrint Arch. 2016: 8 (2016) - [i20]Michael Backes, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Anonymous RAM. IACR Cryptol. ePrint Arch. 2016: 678 (2016) - [i19]Tim Ruffing, Pedro Moreno-Sanchez
, Aniket Kate:
P2P Mixing and Unlinkable Bitcoin Transactions. IACR Cryptol. ePrint Arch. 2016: 824 (2016) - [i18]Giulio Malavolta, Pedro Moreno-Sanchez
, Aniket Kate, Matteo Maffei:
SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. IACR Cryptol. ePrint Arch. 2016: 1054 (2016) - 2015
- [c29]Satrajit Ghosh, Aniket Kate:
Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget). ACNS 2015: 263-286 - [c28]Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing
:
Secrecy Without Perfect Randomness: Cryptography with (Bounded) Weak Sources. ACNS 2015: 675-695 - [c27]Tim Ruffing
, Aniket Kate, Dominique Schröder
:
Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins. CCS 2015: 219-230 - [c26]Bimal Viswanath, Muhammad Ahmad Bashir, Muhammad Bilal Zafar, Simon Bouget
, Saikat Guha, Krishna P. Gummadi, Aniket Kate, Alan Mislove:
Strength in Numbers: Robust Tamper Detection in Crowd Computations. COSN 2015: 113-124 - [c25]Daniel Porto, João Leitão
, Cheng Li, Allen Clement, Aniket Kate, Flavio Paiva Junqueira, Rodrigo Rodrigues:
Visigoth fault tolerance. EuroSys 2015: 8:1-8:14 - [c24]Pedro Moreno-Sanchez
, Aniket Kate, Matteo Maffei, Kim Pecina:
Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces. NDSS 2015 - [i17]Satrajit Ghosh, Aniket Kate:
Post-Quantum Secure Onion Routing (Future Anonymity in Today's Budget). IACR Cryptol. ePrint Arch. 2015: 8 (2015) - 2014
- [c23]Michael Backes, Jeremy Clark, Aniket Kate, Milivoj Simeonovski, Peter Druschel:
BackRef: Accountability in Anonymous Communication Networks. ACNS 2014: 380-400 - [c22]Fabienne Eigner, Matteo Maffei, Ivan Pryvalov, Francesca Pampaloni, Aniket Kate:
Differentially private data aggregation with optimal utility. ACSAC 2014: 316-325 - [c21]Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi:
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection. CCS 2014: 513-524 - [c20]Tim Ruffing
, Pedro Moreno-Sanchez
, Aniket Kate:
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin. ESORICS (2) 2014: 345-364 - [c19]Michael Backes, Fabian Bendun, Ashish Choudhury, Aniket Kate:
Asynchronous MPC with a strict honest majority using non-equivocation. PODC 2014: 10-19 - [c18]Michael Backes, Niklas Grimm, Aniket Kate:
Lime: Data Lineage in the Malicious Environment. STM 2014: 183-187 - [i16]Michael Backes, Niklas Grimm, Aniket Kate:
Lime: Data Lineage in the Malicious Environment. CoRR abs/1408.1076 (2014) - [i15]Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi:
AnoA: A Framework For Analyzing Anonymous Communication Protocols. IACR Cryptol. ePrint Arch. 2014: 87 (2014) - [i14]Ivan Pryvalov, Aniket Kate:
Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2014: 247 (2014) - [i13]Fabienne Eigner, Aniket Kate, Matteo Maffei, Francesca Pampaloni, Ivan Pryvalov:
Privacy-preserving Data Aggregation with Optimal Utility. IACR Cryptol. ePrint Arch. 2014: 482 (2014) - [i12]Michael Backes, Aniket Kate, Sebastian Meiser, Esfandiar Mohammadi:
(Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection. IACR Cryptol. ePrint Arch. 2014: 621 (2014) - 2013
- [j3]Maxwell Young, Aniket Kate, Ian Goldberg, Martin Karsten:
Towards Practical Communication in Byzantine-Resistant DHTs. IEEE/ACM Trans. Netw. 21(1): 190-203 (2013) - [c17]Tim Ruffing
, Jonas Schneider, Aniket Kate:
Identity-based steganography and its applications to censorship resistance. CCS 2013: 1461-1464 - [c16]Michael Backes, Aniket Kate, Praveen Manoharan
, Sebastian Meiser, Esfandiar Mohammadi:
AnoA: A Framework for Analyzing Anonymous Communication Protocols. CSF 2013: 163-178 - [c15]Michael Backes, Amit Datta, Aniket Kate:
Asynchronous Computational VSS with Reduced Communication Complexity. CT-RSA 2013: 259-276 - [i11]Michael Backes, Jeremy Clark, Peter Druschel, Aniket Kate, Milivoj Simeonovski:
Introducing Accountability to Anonymity Networks. CoRR abs/1311.3151 (2013) - [i10]Michael Backes, Fabian Bendun, Ashish Choudhury, Aniket Kate:
Asynchronous MPC with t<n/2 Using Non-equivocation. IACR Cryptol. ePrint Arch. 2013: 745 (2013) - [i9]Michael Backes, Aniket Kate, Sebastian Meiser, Tim Ruffing:
Differential Indistinguishability for Cryptographic Primitives with Imperfect Randomness. IACR Cryptol. ePrint Arch. 2013: 808 (2013) - 2012
- [c14]Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft:
Adding query privacy to robust DHTs. AsiaCCS 2012: 30-31 - [c13]Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi:
Provably Secure and Practical Onion Routing. CSF 2012: 369-385 - [c12]Michael Backes, Fabian Bendun, Aniket Kate:
Brief announcement: distributed cryptography using trinc. PODC 2012: 91-92 - [c11]Allen Clement, Flavio Junqueira, Aniket Kate, Rodrigo Rodrigues
:
On the (limited) power of non-equivocation. PODC 2012: 301-308 - [c10]Michael Backes, Aniket Kate, Matteo Maffei, Kim Pecina:
ObliviAd: Provably Secure and Practical Online Behavioral Advertising. IEEE Symposium on Security and Privacy 2012: 257-271 - [c9]Michael Backes, Aniket Kate, Esfandiar Mohammadi:
Ace: an efficient key-exchange protocol for onion routing. WPES 2012: 55-64 - [i8]Aniket Kate, Yizhou Huang, Ian Goldberg:
Distributed Key Generation in the Wild. IACR Cryptol. ePrint Arch. 2012: 377 (2012) - [i7]Michael Backes, Amit Datta, Aniket Kate:
Asynchronous Computational VSS with Reduced Communication Complexity. IACR Cryptol. ePrint Arch. 2012: 619 (2012) - 2011
- [j2]Aniket Kate, Ian Goldberg:
Generalizing cryptosystems based on the subset sum problem. Int. J. Inf. Sec. 10(3): 189-199 (2011) - [c8]Michael Backes, Aniket Kate, Arpita Patra:
Computational Verifiable Secret Sharing Revisited. ASIACRYPT 2011: 590-609 - [i6]Michael Backes, Ian Goldberg, Aniket Kate, Tomas Toft:
Adding Query Privacy to Robust DHTs. CoRR abs/1107.1072 (2011) - [i5]Michael Backes, Aniket Kate, Arpita Patra:
Computational Verifiable Secret Sharing Revisited. IACR Cryptol. ePrint Arch. 2011: 281 (2011) - [i4]Michael Backes, Ian Goldberg, Aniket Kate, Esfandiar Mohammadi:
Provably Secure and Practical Onion Routing. IACR Cryptol. ePrint Arch. 2011: 308 (2011) - 2010
- [b1]