Anshu Yadav

Orcid: 0000-0002-0593-3841

According to our database1, Anshu Yadav authored at least 15 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Entropy stable finite difference schemes for Chew, Goldberger & Low anisotropic plasma flow equations.
CoRR, 2024

2023
Entropy Stable Schemes for the Shear Shallow Water Model Equations.
J. Sci. Comput., December, 2023

Attribute-Based Multi-Input FE (and more) for Attribute-Weighted Sums.
IACR Cryptol. ePrint Arch., 2023

Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE.
IACR Cryptol. ePrint Arch., 2023

Broadcast, Trace and Revoke with Optimal Parameters from Polynomial Hardness.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Study of Predictors of Organizational Effectiveness Among Private and Public Sector IT Companies.
Int. J. Hum. Cap. Inf. Technol. Prof., 2022

Multi-Input Attribute Based Encryption and Predicate Encryption.
IACR Cryptol. ePrint Arch., 2022

Round-Optimal Lattice-Based Threshold Signatures, Revisited.
IACR Cryptol. ePrint Arch., 2022

Trace and Revoke with Optimal Parameters from Polynomial Hardness.
IACR Cryptol. ePrint Arch., 2022

A Review on Gsm Based LPG Leakage Detection and Controller.
Proceedings of the 4th International Conference on Information Management & Machine Intelligence, 2022

Practical, Round-Optimal Lattice-Based Blind Signatures.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Entropy stable discontinuous Galerkin methods for ten-moment Gaussian closure equations.
J. Comput. Phys., 2021

Can Round-Optimal Lattice-Based Blind Signatures be Practical?
IACR Cryptol. ePrint Arch., 2021

2016
Dynamic server consolidation algorithms: a profit model for evaluation and an improvement.
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016

2012
Towards Formal Analysis of Key Control in Group Key Agreement Protocols.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2012


  Loading...