Vinod Vaikuntanathan's Publications
[Back to home page]
Copyright Notice:
This material is presented to ensure timely
dissemination of scholarly and technical work. Copyright and all rights therein
are retained by authors or by other copyright holders. All persons copying this
information are expected to adhere to the terms and constraints invoked by each
author's copyright. These works may not be reposted without the explicit
permission of the copyright holder. Also, some of these works have been
submitted for publication. Copyright may be transferred without further notice
and this version may no longer be accessible.
Full List of Publications
- Collusion-Resistant Obfuscation
N. Chandran, M. Chase and V. Vaikuntanathan
In Submission
- Efficient Password-based Key-exchange from Oblivious Transfer
R. Canetti, D. Dachman-Soled, V. Vaikuntanathan and H. Wee
In Submission
- An Inspection-Resistant On-chip Memory Architecture
Melissa Chase, Andrew Putnam, Tim Sherwood, Dan Shumow and V. Vaikuntanathan
In Submission
- Round-optimal Password-based Key-exchange
J. Katz and V. Vaikuntanathan
TCC 2011 (to appear)
- A Group Signature Scheme from Lattice Assumptions
S. Dov Gordon and J. Katz and V. Vaikuntanathan
Asiacrypt 2010 (to appear).
- Cryptography against continual Memory Leakage
Z. Brakerski, Y. Kalai, J. Katz and V. Vaikuntanathan
FOCS 2010 (to appear).
Cryptology Eprint Archive.
- i-hop Homomorphic Encryption Schemes
C. Gentry, S. Halevi and V. Vaikuntanathan
Cryptology Eprint Archive.
CRYPTO 2010 (to appear).
- Fully Homomorphic Encryption from Integers
M. van Dijk, C. Gentry, S. Halevi and V. Vaikuntanathan
Cryptology Eprint Archive.
Eurocrypt 2010 (to appear).
- A Simple BGN-Style Encryption Scheme from LWE
C. Gentry, S. Halevi and V. Vaikuntanathan
Eurocrypt 2010 (to appear).
- Protecting against Computationally Bounded and Noisy Leakage
S. Faust, T. Rabin, L. Reyzin, E. Tromer and V. Vaikuntanathan
Eurocrypt 2010 (to appear).
- Robustness of the Learning with Errors Assumption
S. Goldwasser, Y. Kalai, C. Peikert and V. Vaikuntanathan
Innovations in Computer Science (ICS) 2010. [pdf]
- Public-key Encryption Schemes with Auxiliary Inputs
Y. Dodis, S. Goldwasser, Y. Kalai, C. Peikert and V. Vaikuntanathan
Theory of Cryptography Conference (TCC) 2010. [pdf]
- Signature Schemes with Bounded Leakage Resilience
J. Katz and V. Vaikuntanathan
Asiacrypt 2009. [pdf]
- Smooth Projective Hashing and Password-based Authenticated Key-exchange from Lattices
J. Katz and V. Vaikuntanathan
Asiacrypt 2009. [pdf]
- Cryptography against Memory Attacks
A. Akavia, S. Goldwasser and V. Vaikuntanathan
TCC 2009. [pdf]
- Weak Verifiable Random Functions
Z. Brakerski, S. Goldwasser, G. Rothblum and V. Vaikuntanathan
TCC 2009. [pdf]
- How Efficient Can Memory-Checking Be?
C. Dwork, M. Naor, G. Rothblum and V. Vaikuntanathan
TCC 2009. [pdf]
- Trapdoors for Hard Lattices, and New Cryptographic Constructions
C. Gentry, C. Peikert and V. Vaikuntanathan
STOC 2008 [pdf]
- A Framework for Efficient and Composable Oblivious Transfer
C. Peikert, V. Vaikuntanathan and B. Waters
CRYPTO 2008 [pdf]
- Non-Interactive Statistical Zero-knowledge for Lattice Problems
C. Peikert and V. Vaikuntanathan
CRYPTO 2008 [pdf]
- Adaptive One-way Functions and Applications
O. Pandey, R. Pass and V. Vaikuntanathan
CRYPTO 2008 [pdf]
- Securely Obfuscating Re-encryption
Susan Hohenberger, Guy Rothblum, abhi shelat, and Vinod Vaikuntanathan
Theory of Cryptography Conference TCC 2007
Invited to the Journal of Cryptology [Full Version ps, pdf]
- Secure Computation from Random Error-Correcting Codes
R. Cramer, H. Chen, S. Goldwasser, R. de Haan and V. Vaikuntanathan
Eurocrypt 2007 [ps, pdf]
- Bounded CCA2-Secure Encryption
R. Cramer, G. Hanaoka, D. Hofheinz, H. Imai, E. Kiltz, R. Pass, A. Shelat and V. Vaikuntanathan
Asiacrypt 2007 [ps, pdf]
- Relations Among Notions of Non-Malleability for Encryption
R. Pass, A. Shelat and V. Vaikuntanathan
Asiacrypt 2007 [ps, pdf]
- Construction of a Non-Malleable Encryption Scheme From Any Semantically Secure One
R. Pass, A. Shelat and V. Vaikuntanathan
Crypto 2006 [ps, pdf]
- Fault-tolerant Distributed Computing in Full-Information Networks
S. Goldwasser, E. Pavlov and V. Vaikuntanathan
FOCS 2006 [ps, pdf]
- Byzantine Agreement in the Full-Information Model in O(log n) Rounds
M. Ben-Or, E. Pavlov and V. Vaikuntanathan
STOC 2006 [ps, pdf]
- Distributed Computing With Imperfect Randomness
S. Goldwasser, M. Sudan and V. Vaikuntanathan
DISC 2005 [ps, pdf]
- Broadcast in Radio Networks in the Presence of Byzantine Faults
V. Vaikuntanathan
Brief Announcement : PODC 2005 [Full Version ps, pdf]
- Information Leak in the Chord Lookup Protocol
C.W. O'Donnell and V. Vaikuntanathan
P2P 2004 [ps, pdf]
- Distributed Consensus in the Presence of Sectional Faults
A. Aiyer, I. Sanketh, K. Srinathan, V. Vaikuntanathan and C. Pandu Rangan
PODC 2003 [ps, pdf]
- Efficient Perfectly Secure Communication over Synchronous Networks
K. Srinathan, V. Vaikuntanathan and C. Pandu Rangan
PODC 2003 [ps, pdf]
- On the Power of Computational Secret Sharing
A. Narayanan, K. Srinathan, V. Vaikuntanathan and C. Pandu Rangan
Indocrypt 2003 [ps, pdf]