Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Chandran, Nishanth
add a person with the name Chandran, Nishanth
 

Other publications of authors with the same name

Almost-Everywhere Secure Computation with Edge Corruptions., , and . J. Cryptology, 28 (4): 745-768 (2015)A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks., , and . IACR Cryptology ePrint Archive, (2008)New Constructions for UC Secure Computation using Tamper-proof Hardware., , and . IACR Cryptology ePrint Archive, (2007)Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case., , , and . ACM Conference on Computer and Communications Security, page 277-294. ACM, (2017)Information-Theoretic Local Non-malleable Codes and Their Applications., , and . TCC (A2), volume 9563 of Lecture Notes in Computer Science, page 367-392. Springer, (2016)Locally Updatable and Locally Decodable Codes., , and . TCC, volume 8349 of Lecture Notes in Computer Science, page 489-514. Springer, (2014)Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices., , , , and . Public Key Cryptography, volume 8383 of Lecture Notes in Computer Science, page 95-112. Springer, (2014)Position Based Cryptography., , , and . CRYPTO, volume 5677 of Lecture Notes in Computer Science, page 391-407. Springer, (2009)A Secure Cryptographic Token Interface., and . CSF, page 141-153. IEEE Computer Society, (2009)Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions., and . INDOCRYPT, volume 8885 of Lecture Notes in Computer Science, page 89-103. Springer, (2014)