Follow
Vanishree Rao
Vanishree Rao
Xerox PARC
Verified email at parc.com - Homepage
Title
Cited by
Cited by
Year
Correlated-input secure hash functions
V Goyal, A O’Neill, V Rao
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011
1272011
Round optimal blind signatures
S Garg, V Rao, A Sahai, D Schröder, D Unruh
Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa …, 2011
702011
Adaptively secure, universally composable, multiparty computation in constant rounds
D Dachman-Soled, J Katz, V Rao
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
642015
Adaptive security of constrained PRFs
G Fuchsbauer, M Konstantinov, K Pietrzak, V Rao
Advances in Cryptology–ASIACRYPT 2014: 20th International Conference on the …, 2014
492014
Standard security does not imply indistinguishability under selective opening
D Hofheinz, V Rao, D Wichs
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016
482016
Achieving differential privacy in secure multiparty data aggregation protocols on star networks
V Bindschaedler, S Rane, AE Brito, V Rao, E Uzun
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
352017
Method for differentially private aggregation in a star topology under a realistic adversarial model
S Rane, V Bindschaedler, AE Brito, E Uzun, V Rao
US Patent 10,223,547, 2019
312019
Revisiting lower and upper bounds for selective decommitments
R Ostrovsky, V Rao, A Scafuro, I Visconti
Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013
242013
Adaptively secure multi-party computation from LWE (via equivocal FHE)
I Damgård, A Polychroniadou, V Rao
Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016
192016
Multi-party key exchange for unbounded parties from indistinguishability obfuscation
D Khurana, V Rao, A Sahai
International Conference on the Theory and Application of Cryptology and …, 2015
152015
Adaptive multiparty non-interactive key exchange without setup in the standard model
V Rao
Cryptology ePrint Archive, 2014
102014
On selective-opening attacks against encryption schemes
R Ostrovsky, V Rao, I Visconti
Security and Cryptography for Networks: 9th International Conference, SCN …, 2014
82014
Statistical concurrent non-malleable zero knowledge
C Orlandi, R Ostrovsky, V Rao, A Sahai, I Visconti
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014 …, 2014
72014
Microspring structure for hardware trusted platform module
WB Jackson, V Rao, EM Chow
US Patent 11,289,443, 2022
62022
Computer-implemented system and method for protecting sensitive data via data re-encryption
V Rao, S Rane, E Uzun, AE Brito
US Patent 10,277,563, 2019
62019
Secure two-party feature selection
V Rao, Y Long, H Eldardiry, S Rane, R Rossi, F Torres
arXiv preprint arXiv:1901.00832, 2019
62019
Adaptively secure uc constant round multi-party computation
I Damgård, A Polychroniadou, V Rao
Cryptology ePrint Archive, Report 2014/830, 2014
52014
On the (in) security of Fischlin’s paradigm
P Ananth, R Bhaskar, V Goyal, V Rao
Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013
52013
System and architecture for analytics on encrypted databases
S Rane, V Bindschaedler, AE Brito, E Uzun, V Rao
US Patent 10,846,423, 2020
12020
System and architecture for supporting analytics on encrypted databases
S Rane, V Bindschaedler, AE Brito, E Uzun, V Rao
US Patent 10,783,263, 2020
12020
The system can't perform the operation now. Try again later.
Articles 1–20