Aniket Kate
Orcid: 0000-0003-2246-8416Affiliations:
- Purdue University, West Lafayette, USA
According to our database1,
Aniket Kate
authored at least 147 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography.
Dataset, May, 2024
Random Beacons in Monte Carlo: Efficient Asynchronous Random Beacon without Threshold Cryptography.
Dataset, April, 2024
Int. J. Inf. Sec., February, 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proxying is Enough: Security of Proxying in TLS Oracles and AEAD Context Unforgeability.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
V3rified: Revelation vs Non-Revelation Mechanisms for Decentralized Verifiable Computation.
CoRR, 2024
IACR Commun. Cryptol., 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
SensorBFT: Fault-Tolerant Target Localization Using Voronoi Diagrams and Approximate Agreement.
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
HashRand: Efficient Asynchronous Random Beacon without Threshold Cryptographic Setup.
IACR Cryptol. ePrint Arch., 2023
CoRR, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
Proceedings of the 24th International Middleware Conference, 2023
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
Proceedings of the Financial Cryptography and Data Security, 2023
Proceedings of the 36th IEEE Computer Security Foundations Symposium, 2023
2022
Proc. Priv. Enhancing Technol., 2022
Proc. Priv. Enhancing Technol., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Empirical Understanding of Deletion Privacy: Experiences, Expectations, and Measures.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 4th IEEE International Conference on Trust, 2022
Proceedings of the Financial Cryptography and Data Security, 2022
Proceedings of the 4th ACM Conference on Advances in Financial Technologies, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the GPCE '21: Concepts and Experiences, Chicago, IL, USA, October 17, 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the Ninth International Workshop on Security in Blockchain and Cloud Computing, 2021
2020
Proc. Priv. Enhancing Technol., 2020
Proc. Priv. Enhancing Technol., 2020
Proc. Priv. Enhancing Technol., 2020
IACR Cryptol. ePrint Arch., 2020
"My Friend Wanted to Talk About It and I Didn't": Understanding Perceptions of Deletion Privacy in Social Platforms.
CoRR, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
2019
Proc. Priv. Enhancing Technol., 2019
DLSAG: Non-Interactive Refund Transactions For Interoperable Payment Channels in Monero.
IACR Cryptol. ePrint Arch., 2019
HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication.
IACR Cryptol. ePrint Arch., 2019
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
IACR Cryptol. ePrint Arch., 2019
A Tale of Two Trees: One Writes, and Other Reads. Optimized Oblivious Accesses to Large-Scale Blockchains.
CoRR, 2019
Brief Note: Asynchronous Verifiable Secret Sharing with Optimal Resilience and Linear Amortized Overhead.
CoRR, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Analyzing Semantic Correctness with Symbolic Execution: A Case Study on PKCS#1 v1.5 Signature Verification.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the IEEE International Conference on Decentralized Applications and Infrastructures, 2019
HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
R3C3: Cryptographically secure Censorship Resistant Rendezvous using Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Multi-Hop Locks for Secure, Privacy-Preserving and Interoperable Payment-Channel Networks.
IACR Cryptol. ePrint Arch., 2018
Flexible Signatures: Towards Making Authentication Suitable for Real-Time Environments.
IACR Cryptol. ePrint Arch., 2018
Comput. Secur., 2018
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018
Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Why Johnny Can't Make Money With His Contents: Pitfalls of Designing and Implementing Content Delivery Apps.
Proceedings of the 34th Annual Computer Security Applications Conference, 2018
2017
Proc. Priv. Enhancing Technol., 2017
IEEE Internet Comput., 2017
IACR Cryptol. ePrint Arch., 2017
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Forgetting the Forgotten with Letheia, Concealing Content Deletion from Persistent Observers.
CoRR, 2017
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Listening to Whispers of Ripple: Linking Wallets and Deanonymizing Transactions in the Ripple Network.
Proc. Priv. Enhancing Technol., 2016
J. Priv. Confidentiality, 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Forgetting in Social Media: Understanding and Controlling Longitudinal Exposure of Socially Shared Data.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Privacy Preserving Payments in Credit Networks: Enabling trust with privacy in online marketplaces.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015
Proceedings of the Tenth European Conference on Computer Systems, 2015
Proceedings of the 2015 ACM on Conference on Online Social Networks, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Security and Trust Management - 10th International Workshop, 2014
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
Proceedings of the Applied Cryptography and Network Security, 2014
2013
IEEE/ACM Trans. Netw., 2013
Differential Indistinguishability for Cryptographic Primitives with Imperfect Randomness.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2012
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
2010
ACM Trans. Inf. Syst. Secur., 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
2007
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007