V. Vinod
List of publications from the
| 2009 |
| 21 | EE | Adi Akavia,
Shafi Goldwasser,
Vinod Vaikuntanathan:
Simultaneous Hardcore Bits and Cryptography against Memory Attacks.
TCC 2009: 474-495 |
| 20 | EE | Cynthia Dwork,
Moni Naor,
Guy N. Rothblum,
Vinod Vaikuntanathan:
How Efficient Can Memory Checking Be?.
TCC 2009: 503-520 |
| 19 | EE | Zvika Brakerski,
Shafi Goldwasser,
Guy N. Rothblum,
Vinod Vaikuntanathan:
Weak Verifiable Random Functions.
TCC 2009: 558-576 |
| 2008 |
| 18 | EE | Chris Peikert,
Vinod Vaikuntanathan:
Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems.
CRYPTO 2008: 536-553 |
| 17 | EE | Chris Peikert,
Vinod Vaikuntanathan,
Brent Waters:
A Framework for Efficient and Composable Oblivious Transfer.
CRYPTO 2008: 554-571 |
| 16 | EE | Omkant Pandey,
Rafael Pass,
Vinod Vaikuntanathan:
Adaptive One-Way Functions and Applications.
CRYPTO 2008: 57-74 |
| 15 | EE | Craig Gentry,
Chris Peikert,
Vinod Vaikuntanathan:
Trapdoors for hard lattices and new cryptographic constructions.
STOC 2008: 197-206 |
| 2007 |
| 14 | EE | Ronald Cramer,
Goichiro Hanaoka,
Dennis Hofheinz,
Hideki Imai,
Eike Kiltz,
Rafael Pass,
Abhi Shelat,
Vinod Vaikuntanathan:
Bounded CCA2-Secure Encryption.
ASIACRYPT 2007: 502-518 |
| 13 | EE | Rafael Pass,
Abhi Shelat,
Vinod Vaikuntanathan:
Relations Among Notions of Non-malleability for Encryption.
ASIACRYPT 2007: 519-535 |
| 12 | EE | Hao Chen,
Ronald Cramer,
Shafi Goldwasser,
Robbert de Haan,
Vinod Vaikuntanathan:
Secure Computation from Random Error Correcting Codes.
EUROCRYPT 2007: 291-310 |
| 11 | EE | Susan Hohenberger,
Guy N. Rothblum,
Abhi Shelat,
Vinod Vaikuntanathan:
Securely Obfuscating Re-encryption.
TCC 2007: 233-252 |
| 10 | EE | Craig Gentry,
Chris Peikert,
Vinod Vaikuntanathan:
Trapdoors for Hard Lattices and New Cryptographic Constructions.
Electronic Colloquium on Computational Complexity (ECCC) 14(133): (2007) |
| 2006 |
| 9 | EE | Rafael Pass,
Abhi Shelat,
Vinod Vaikuntanathan:
Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One.
CRYPTO 2006: 271-289 |
| 8 | EE | Shafi Goldwasser,
Elan Pavlov,
Vinod Vaikuntanathan:
Fault-Tolerant Distributed Computing in Full-Information Networks.
FOCS 2006: 15-26 |
| 7 | EE | Michael Ben-Or,
Elan Pavlov,
Vinod Vaikuntanathan:
Byzantine agreement in the full-information model in O(log n) rounds.
STOC 2006: 179-186 |
| 2005 |
| 6 | EE | Shafi Goldwasser,
Madhu Sudan,
Vinod Vaikuntanathan:
Distributed Computing with Imperfect Randomness.
DISC 2005: 288-302 |
| 5 | EE | Vinod Vaikuntanathan:
Brief announcement: broadcast in radio networks in the presence of byzantine adversaries.
PODC 2005: 167 |
| 2004 |
| 4 | EE | Charles W. O'Donnell,
Vinod Vaikuntanathan:
Information Leak in the Chord Lookup Protocol.
Peer-to-Peer Computing 2004: 28-35 |
| 2003 |
| 3 | EE | V. Vinod,
Arvind Narayanan,
K. Srinathan,
C. Pandu Rangan,
Kwangjo Kim:
On the Power of Computational Secret Sharing.
INDOCRYPT 2003: 162-176 |
| 2 | EE | S. Amitanand,
I. Sanketh,
K. Srinathan,
V. Vinod,
C. Pandu Rangan:
Distributed consensus in the presence of sectional faults.
PODC 2003: 202-210 |
| 1 | EE | K. Srinathan,
V. Vinod,
C. Pandu Rangan:
Brief announcement: efficient perfectly secure communication over synchronous networks.
PODC 2003: 252 |