Hemanta K. Maji
Orcid: 0000-0003-4244-8658
According to our database1,
Hemanta K. Maji
authored at least 74 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
2022
Proc. Priv. Enhancing Technol., 2022
IACR Cryptol. ePrint Arch., 2022
Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the IEEE International Symposium on Information Theory, 2022
Proceedings of the 63rd IEEE Annual Symposium on Foundations of Computer Science, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme & Its Consequences.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Leakage-resilience of the Shamir Secret-sharing Scheme against Physical-bit Leakages.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the IEEE International Symposium on Information Theory, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the SIAM Workshop on Combinatorial Scientific Computing, 2020
2019
Estimating Gaps in Martingales and Applications to Coin-Tossing: Constructions and Hardness.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
Secure Computation with Constant Communication Overhead using Multiplication Embeddings.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Progress in Cryptology - INDOCRYPT 2018, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
2016
Proceedings of the IEEE 57th Annual Symposium on Foundations of Computer Science, 2016
On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations.
Proceedings of the Theory of Cryptography - 12th Theory of Cryptography Conference, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015
2014
A Full Characterization of Completeness for Two-party Randomized Function Evaluation.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering and Permutations.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Electron. Colloquium Comput. Complex., 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
2013
Proceedings of the Secure Multi-Party Computation, 2013
IACR Cryptol. ePrint Arch., 2013
Electron. Colloquium Comput. Complex., 2013
2012
Electron. Colloquium Comput. Complex., 2012
A Unified Characterization of Completeness and Triviality for Secure Function Evaluation.
Proceedings of the Progress in Cryptology, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011
Proceedings of the IEEE 52nd Annual Symposium on Foundations of Computer Science, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010
A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security.
Proceedings of the Advances in Cryptology, 2010
2009
Electron. Colloquium Comput. Complex., 2009
Complexity of Multi-party Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation.
Proceedings of the Theory of Cryptography, 6th Theory of Cryptography Conference, 2009
2008
Complexity of Multiparty Computation Problems: The Case of 2-Party Symmetric Secure Function Evaluation.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
2006
Proceedings of the EACL 2006, 2006
2005
Proceedings of the IJCAI-05, Proceedings of the Nineteenth International Joint Conference on Artificial Intelligence, Edinburgh, Scotland, UK, July 30, 2005
A New Decoding Algorithm for Statistical Machine Translation: Design and Implementation.
Proceedings of the Seventh Workshop on Algorithm Engineering and Experiments and the Second Workshop on Analytic Algorithmics and Combinatorics, 2005
2004
An Algorithmic Framework for Solving the Decoding Problem in Statistical Machine Translation.
Proceedings of the COLING 2004, 2004
2003
Generic System to Evolve Memory and Recall Based Fuzzy Controllers for Anytime Learning.
Proceedings of the 1st Indian International Conference on Artificial Intelligence, 2003