Mayank Varia
Orcid: 0000-0002-7460-3272
According to our database1,
Mayank Varia
authored at least 76 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Companion of the 2024 International Conference on Management of Data, 2024
2023
TVA: A multi-party computation system for secure and expressive time series analytics.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023
2022
Proc. Priv. Enhancing Technol., 2022
Practical and Improved Byzantine Reliable Broadcast and Asynchronous Verifiable Information Dispersal from Hash Functions.
IACR Cryptol. ePrint Arch., 2022
Balanced Byzantine Reliable Broadcast with Near-Optimal Communication and Improved Computation.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Brief Announcement: Asynchronous Verifiable Information Dispersal with Near-Optimal Communication.
Proceedings of the PODC '22: ACM Symposium on Principles of Distributed Computing, Salerno, Italy, July 25, 2022
Proceedings of the IEEE High Performance Extreme Computing Conference, 2022
Proceedings of the 30th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2022
Multi-Regulation Computing: Examining the Legal and Policy Questions That Arise From Secure Multiparty Computation.
Proceedings of the 2022 Symposium on Computer Science and Law, 2022
Formalizing Human Ingenuity: A Quantitative Framework for Copyright Law's Substantial Similarity.
Proceedings of the 2022 Symposium on Computer Science and Law, 2022
Proceedings of the 2022 Symposium on Computer Science and Law, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
CoRR, 2020
Proceedings of the 2020 IEEE High Performance Extreme Computing Conference, 2020
Proceedings of the 30th International Conference on Field-Programmable Logic and Applications, 2020
2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019
Role-Based Ecosystem for the Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications.
Proceedings of the 2019 IEEE Cybersecurity Development, 2019
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
A Cryptographic Airbag for Metadata: Protecting Business Records Against Unlimited Search and Seizure.
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018
Accessible Privacy-Preserving Web-Based Data Analysis for Assessing and Addressing Economic Inequalities.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018
2017
Role-Based Ecosystem Model for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Commun. ACM, 2017
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017
Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the IEEE Cybersecurity Development, 2016
Diversity Within the Rijndael Design Principles for Resistance to Differential Power Analysis.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security.
CoRR, 2015
Parallel vectorized algebraic AES in Matlab for rapid prototyping of encrypted sensor processing algorithms and database analytics.
Proceedings of the 2015 IEEE High Performance Extreme Computing Conference, 2015
2014
Proceedings of the 2014 IEEE Information Theory Workshop, 2014
Proceedings of the IEEE High Performance Extreme Computing Conference, 2014
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014
2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013
Proceedings of the 12th International Conference on Document Analysis and Recognition, 2013
Proceedings of the 51st Annual Allerton Conference on Communication, 2013
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
2008