Research
Intro
Focus areas
Projects
Publications
Education
Culture
Events
People
Generative adversarial user privacy in lossy single-server information retrieval
Vetted Encryption
Boolean Polynomials, BDDs and CRHS Equations – Connecting the Dots with CryptaPath
An Algebraic Attack on Ciphers with Low-Degree Round Functions: Application to Full MiMC
Succinct Functional Commitment for a Large Class of Arithmetic Circuits
On Adaptive Security of Delayed-Input Sigma-Protocols and Fiat-Shamir NIZKs
Private edge computing for linear inference based on secret sharing
Key-and-Argument-Updatable QA-NIZKs
On QA-NIZK in the BPK Model
On the Capacity of Private Monomial Computation
1
2
Next
keyboard_arrow_up
Menu