Vinod Vaikuntanathan's Publications
[Back to home page]
Copyright Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder. Also, some of these works have been submitted for publication. Copyright may be transferred without further notice and this version may no longer be accessible.

Full List of Publications

  1. Collusion-Resistant Obfuscation
    N. Chandran, M. Chase and V. Vaikuntanathan
    In Submission

  2. Efficient Password-based Key-exchange from Oblivious Transfer
    R. Canetti, D. Dachman-Soled, V. Vaikuntanathan and H. Wee
    In Submission

  3. An Inspection-Resistant On-chip Memory Architecture
    Melissa Chase, Andrew Putnam, Tim Sherwood, Dan Shumow and V. Vaikuntanathan
    In Submission

  4. Round-optimal Password-based Key-exchange
    J. Katz and V. Vaikuntanathan
    TCC 2011 (to appear)

  5. A Group Signature Scheme from Lattice Assumptions
    S. Dov Gordon and J. Katz and V. Vaikuntanathan
    Asiacrypt 2010 (to appear).

  6. Cryptography against continual Memory Leakage
    Z. Brakerski, Y. Kalai, J. Katz and V. Vaikuntanathan
    FOCS 2010 (to appear).
    Cryptology Eprint Archive.

  7. i-hop Homomorphic Encryption Schemes
    C. Gentry, S. Halevi and V. Vaikuntanathan
    Cryptology Eprint Archive.
    CRYPTO 2010 (to appear).

  8. Fully Homomorphic Encryption from Integers
    M. van Dijk, C. Gentry, S. Halevi and V. Vaikuntanathan
    Cryptology Eprint Archive.
    Eurocrypt 2010 (to appear).

  9. A Simple BGN-Style Encryption Scheme from LWE
    C. Gentry, S. Halevi and V. Vaikuntanathan
    Eurocrypt 2010 (to appear).

  10. Protecting against Computationally Bounded and Noisy Leakage
    S. Faust, T. Rabin, L. Reyzin, E. Tromer and V. Vaikuntanathan
    Eurocrypt 2010 (to appear).

  11. Robustness of the Learning with Errors Assumption
    S. Goldwasser, Y. Kalai, C. Peikert and V. Vaikuntanathan
    Innovations in Computer Science (ICS) 2010. [pdf]

  12. Public-key Encryption Schemes with Auxiliary Inputs
    Y. Dodis, S. Goldwasser, Y. Kalai, C. Peikert and V. Vaikuntanathan
    Theory of Cryptography Conference (TCC) 2010. [pdf]

  13. Signature Schemes with Bounded Leakage Resilience
    J. Katz and V. Vaikuntanathan
    Asiacrypt 2009. [pdf]

  14. Smooth Projective Hashing and Password-based Authenticated Key-exchange from Lattices
    J. Katz and V. Vaikuntanathan
    Asiacrypt 2009. [pdf]

  15. Cryptography against Memory Attacks
    A. Akavia, S. Goldwasser and V. Vaikuntanathan
    TCC 2009. [pdf]

  16. Weak Verifiable Random Functions
    Z. Brakerski, S. Goldwasser, G. Rothblum and V. Vaikuntanathan
    TCC 2009. [pdf]

  17. How Efficient Can Memory-Checking Be?
    C. Dwork, M. Naor, G. Rothblum and V. Vaikuntanathan
    TCC 2009. [pdf]

  18. Trapdoors for Hard Lattices, and New Cryptographic Constructions
    C. Gentry, C. Peikert and V. Vaikuntanathan
    STOC 2008 [pdf]

  19. A Framework for Efficient and Composable Oblivious Transfer
    C. Peikert, V. Vaikuntanathan and B. Waters
    CRYPTO 2008 [pdf]

  20. Non-Interactive Statistical Zero-knowledge for Lattice Problems
    C. Peikert and V. Vaikuntanathan
    CRYPTO 2008 [pdf]

  21. Adaptive One-way Functions and Applications
    O. Pandey, R. Pass and V. Vaikuntanathan
    CRYPTO 2008 [pdf]

  22. Securely Obfuscating Re-encryption
    Susan Hohenberger, Guy Rothblum, abhi shelat, and Vinod Vaikuntanathan
    Theory of Cryptography Conference TCC 2007
    Invited to the Journal of Cryptology [Full Version ps, pdf]

  23. Secure Computation from Random Error-Correcting Codes
    R. Cramer, H. Chen, S. Goldwasser, R. de Haan and V. Vaikuntanathan
    Eurocrypt 2007 [ps, pdf]

  24. Bounded CCA2-Secure Encryption
    R. Cramer, G. Hanaoka, D. Hofheinz, H. Imai, E. Kiltz, R. Pass, A. Shelat and V. Vaikuntanathan
    Asiacrypt 2007 [ps, pdf]

  25. Relations Among Notions of Non-Malleability for Encryption
    R. Pass, A. Shelat and V. Vaikuntanathan
    Asiacrypt 2007 [ps, pdf]

  26. Construction of a Non-Malleable Encryption Scheme From Any Semantically Secure One
    R. Pass, A. Shelat and V. Vaikuntanathan
    Crypto 2006 [ps, pdf]

  27. Fault-tolerant Distributed Computing in Full-Information Networks
    S. Goldwasser, E. Pavlov and V. Vaikuntanathan
    FOCS 2006 [ps, pdf]

  28. Byzantine Agreement in the Full-Information Model in O(log n) Rounds
    M. Ben-Or, E. Pavlov and V. Vaikuntanathan
    STOC 2006 [ps, pdf]

  29. Distributed Computing With Imperfect Randomness
    S. Goldwasser, M. Sudan and V. Vaikuntanathan
    DISC 2005 [ps, pdf]

  30. Broadcast in Radio Networks in the Presence of Byzantine Faults
    V. Vaikuntanathan
    Brief Announcement : PODC 2005 [Full Version ps, pdf]

  31. Information Leak in the Chord Lookup Protocol
    C.W. O'Donnell and V. Vaikuntanathan
    P2P 2004 [ps, pdf]

  32. Distributed Consensus in the Presence of Sectional Faults
    A. Aiyer, I. Sanketh, K. Srinathan, V. Vaikuntanathan and C. Pandu Rangan
    PODC 2003 [ps, pdf]

  33. Efficient Perfectly Secure Communication over Synchronous Networks
    K. Srinathan, V. Vaikuntanathan and C. Pandu Rangan
    PODC 2003 [ps, pdf]

  34. On the Power of Computational Secret Sharing
    A. Narayanan, K. Srinathan, V. Vaikuntanathan and C. Pandu Rangan
    Indocrypt 2003 [ps, pdf]