Efficient lattice (h) ibe in the standard model. S Agrawal, D Boneh, X Boyen Eurocrypt 6110, 553-572, 2010 | 1072 | 2010 |
Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE S Agrawal, D Boneh, X Boyen Advances in Cryptology–CRYPTO 2010: 30th Annual Cryptology Conference, Santa …, 2010 | 457 | 2010 |
Homomorphic MACs: MAC-based integrity for network coding S Agrawal, D Boneh Applied Cryptography and Network Security: 7th International Conference …, 2009 | 344 | 2009 |
Functional encryption for inner product predicates from learning with errors S Agrawal, DM Freeman, V Vaikuntanathan Advances in Cryptology–ASIACRYPT 2011: 17th International Conference on the …, 2011 | 261 | 2011 |
Fully secure functional encryption for inner products, from standard assumptions S Agrawal, B Libert, D Stehlé Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016 | 260 | 2016 |
Functional encryption: New perspectives and lower bounds S Agrawal, S Gorbunov, V Vaikuntanathan, H Wee Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013 | 185 | 2013 |
Functional encryption for threshold functions (or fuzzy IBE) from lattices S Agrawal, X Boyen, V Vaikuntanathan, P Voulgaris, H Wee Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012 | 145 | 2012 |
Preventing pollution attacks in multi-source network coding S Agrawal, D Boneh, X Boyen, DM Freeman Public Key Cryptography–PKC 2010: 13th International Conference on Practice …, 2010 | 62 | 2010 |
Secrecy using compressive sensing S Agrawal, S Vishwanath 2011 IEEE Information Theory Workshop, 563-567, 2011 | 60 | 2011 |
Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation S Agrawal Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 57 | 2019 |
Discrete gaussian leftover hash lemma over infinite domains S Agrawal, C Gentry, S Halevi, A Sahai Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 54 | 2013 |
Functional encryption and property preserving encryption: New definitions and positive results S Agrawal, S Agrawal, S Badrinarayanan, A Kumarasubramanian, ... Cryptology ePrint Archive, 2013 | 54 | 2013 |
Optimal broadcast encryption from pairings and LWE S Agrawal, S Yamada Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020 | 53 | 2020 |
Privacy and security of Aadhaar: a computer science perspective S Agrawal, S Banerjee, S Sharma Economic and Political Weekly 52 (37), 93-102, 2017 | 53 | 2017 |
Stronger security for reusable garbled circuits, general definitions and attacks S Agrawal Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017 | 47 | 2017 |
Adaptive protocols for interactive communication S Agrawal, R Gelles, A Sahai 2016 IEEE International Symposium on Information Theory (ISIT), 595-599, 2016 | 46 | 2016 |
On continual leakage of discrete log representations S Agrawal, Y Dodis, V Vaikuntanathan, D Wichs Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 44 | 2013 |
Efficient public trace and revoke from standard assumptions S Agrawal, S Bhattacherjee, DH Phan, D Stehlé, S Yamada Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 43 | 2017 |
Functional encryption for bounded collusions, revisited S Agrawal, A Rosen Theory of Cryptography: 15th International Conference, TCC 2017, Baltimore …, 2017 | 40 | 2017 |
Fuzzy identity based encryption from lattices S Agrawal, X Boyen, V Vaikuntanathan, P Voulgaris, H Wee Cryptology ePrint Archive, 2011 | 39 | 2011 |