Mayank Varia

Orcid: 0000-0002-7460-3272

According to our database1, Mayank Varia authored at least 76 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Secure Account Recovery for a Privacy-Preserving Web Service.
IACR Cryptol. ePrint Arch., 2024

Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications.
IACR Cryptol. ePrint Arch., 2024

Committing AVID with Partial Retrieval and Optimal Storage.
IACR Cryptol. ePrint Arch., 2024

QueryShield: Cryptographically Secure Analytics in the Cloud.
Proceedings of the Companion of the 2024 International Conference on Management of Data, 2024

2023
TVA: A multi-party computation system for secure and expressive time series analytics.
IACR Cryptol. ePrint Arch., 2023

SECRECY: Secure collaborative analytics in untrusted clouds.
Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation, 2023

2022
(∈, δ)-Indistinguishable Mixing for Cryptocurrencies.
Proc. Priv. Enhancing Technol., 2022

Universally Composable End-to-End Secure Messaging.
IACR Cryptol. ePrint Arch., 2022

Practical and Improved Byzantine Reliable Broadcast and Asynchronous Verifiable Information Dispersal from Hash Functions.
IACR Cryptol. ePrint Arch., 2022

Balanced Byzantine Reliable Broadcast with Near-Optimal Communication and Improved Computation.
IACR Cryptol. ePrint Arch., 2022

Asynchronous Verifiable Information Dispersal with Near-Optimal Communication.
IACR Cryptol. ePrint Arch., 2022

Brief Announcement: Asynchronous Verifiable Information Dispersal with Near-Optimal Communication.
Proceedings of the PODC '22: ACM Symposium on Principles of Distributed Computing, Salerno, Italy, July 25, 2022

Distributed Hardware Accelerated Secure Joint Computation on the COPA Framework.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2022

COPA Use Case: Distributed Secure Joint Computation.
Proceedings of the 30th IEEE Annual International Symposium on Field-Programmable Custom Computing Machines, 2022

Multi-Regulation Computing: Examining the Legal and Policy Questions That Arise From Secure Multiparty Computation.
Proceedings of the 2022 Symposium on Computer Science and Law, 2022

Formalizing Human Ingenuity: A Quantitative Framework for Copyright Law's Substantial Similarity.
Proceedings of the 2022 Symposium on Computer Science and Law, 2022

Can the Government Compel Decryption?: Don't Trust - Verify.
Proceedings of the 2022 Symposium on Computer Science and Law, 2022

2021
(ε, δ)-indistinguishable Mixing for Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2021

Hecate: Abuse Reporting in Secure Messengers with Sealed Sender.
IACR Cryptol. ePrint Arch., 2021

BooLigero: Improved Sublinear Zero Knowledge Proofs for Boolean Circuits.
IACR Cryptol. ePrint Arch., 2021

TurboIKOS: Improved Non-interactive Zero Knowledge and Post-Quantum Signatures.
IACR Cryptol. ePrint Arch., 2021

High-Threshold AVSS with Optimal Communication Complexity.
IACR Cryptol. ePrint Arch., 2021

Succinct Erasure Coding Proof Systems.
IACR Cryptol. ePrint Arch., 2021

Secrecy: Secure collaborative analytics on secret-shared data.
CoRR, 2021

2020
Protecting Cryptography Against Compelled Self-Incrimination.
IACR Cryptol. ePrint Arch., 2020

Two-server Distributed ORAM with Sublinear Computation and Constant Rounds.
IACR Cryptol. ePrint Arch., 2020

Privacy-Preserving Automated Exposure Notification.
IACR Cryptol. ePrint Arch., 2020

Batched Differentially Private Information Retrieval.
IACR Cryptol. ePrint Arch., 2020

Anonymous Collocation Discovery: Taming the Coronavirus While Preserving Privacy.
CoRR, 2020

Arithmetic and Boolean Secret Sharing MPC on FPGAs in the Data Center.
Proceedings of the 2020 IEEE High Performance Extreme Computing Conference, 2020

Secret Sharing MPC on FPGAs in the Datacenter.
Proceedings of the 30th International Conference on Field-Programmable Logic and Applications, 2020

2019
Privacy With Estimation Guarantees.
IEEE Trans. Inf. Theory, 2019

From Usability to Secure Computing and Back Again.
IACR Cryptol. ePrint Arch., 2019

EasyUC: Using EasyCrypt to Mechanize Proofs of Universally Composable Security.
IACR Cryptol. ePrint Arch., 2019

Conclave: secure multi-party computation on big data (extended TR).
CoRR, 2019

Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies.
Proceedings of the Socio-Technical Aspects in Security and Trust, 2019

Role-Based Ecosystem for the Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications.
Proceedings of the 2019 IEEE Cybersecurity Development, 2019

Conclave: secure multi-party computation on big data.
Proceedings of the Fourteenth EuroSys Conference 2019, Dresden, Germany, March 25-28, 2019, 2019

2018
An Analysis of Acceptance Policies For Blockchain Transactions.
IACR Cryptol. ePrint Arch., 2018

On the Universally Composable Security of OpenStack.
IACR Cryptol. ePrint Arch., 2018

A Cryptographic Airbag for Metadata: Protecting Business Records Against Unlimited Search and Seizure.
Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet, 2018

Crypto Crumple Zones: Enabling Limited Access without Mass Surveillance.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Callisto: A Cryptographic Approach to Detecting Serial Perpetrators of Sexual Misconduct.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

Accessible Privacy-Preserving Web-Based Data Analysis for Assessing and Addressing Economic Inequalities.
Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, 2018

2017
Principal Inertia Components and Applications.
IEEE Trans. Inf. Theory, 2017

Role-Based Ecosystem Model for Design, Development, and Deployment of Secure Multi-Party Data Analytics Applications.
IACR Cryptol. ePrint Arch., 2017

Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions.
IACR Cryptol. ePrint Arch., 2017

A Universally Composable Treatment of Network Time.
IACR Cryptol. ePrint Arch., 2017

User-centric distributed solutions for privacy-preserving analytics.
Commun. ACM, 2017

Brief Announcement: Federated Code Auditing and Delivery for MPC.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2017

SoK: Cryptographically Protected Database Search.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Revealing the Unseen: How to Expose Cloud Usage While Protecting User Privacy.
Proceedings of the 2017 IEEE International Conference on Data Mining Workshops, 2017

Mechanizing the Proof of Adaptive, Information-Theoretic Security of Cryptographic Protocols in the Random Oracle Model.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

2016
DEMO: Integrating MPC in Big Data Workflows.
IACR Cryptol. ePrint Arch., 2016

Evolving S-Boxes with Reduced Differential Power Analysis Susceptibility.
IACR Cryptol. ePrint Arch., 2016

The Security of NTP's Datagram Protocol.
IACR Cryptol. ePrint Arch., 2016

Cryptography for Big Data Security.
IACR Cryptol. ePrint Arch., 2016

Secure MPC for Analytics as a Web Application.
Proceedings of the IEEE Cybersecurity Development, 2016

Diversity Within the Rijndael Design Principles for Resistance to Differential Power Analysis.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

Moving in Next Door: Network Flooding as a Side Channel in Cloud Environments.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Automated Assessment of Secure Search Systems.
ACM SIGOPS Oper. Syst. Rev., 2015

HETest: A Homomorphic Encryption Testing Framework.
IACR Cryptol. ePrint Arch., 2015

Computing on Masked Data to improve the Security of Big Data.
CoRR, 2015

Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security.
CoRR, 2015

Cryptographically Secure Computation.
Computer, 2015

Parallel vectorized algebraic AES in Matlab for rapid prototyping of encrypted sensor processing algorithms and database analytics.
Proceedings of the 2015 IEEE High Performance Extreme Computing Conference, 2015

2014
An exploration of the role of principal inertia components in information theory.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

Computing on masked data: a high performance method for improving big data veracity.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2014

On information-theoretic metrics for symmetric-key encryption and privacy.
Proceedings of the 52nd Annual Allerton Conference on Communication, 2014

2013
The Probabilistic Provenance Graph.
Proceedings of the 2013 IEEE Symposium on Security and Privacy Workshops, 2013

Achieving Linguistic Provenance via Plagiarism Detection.
Proceedings of the 12th International Conference on Document Analysis and Recognition, 2013

Bounds on inference.
Proceedings of the 51st Annual Allerton Conference on Communication, 2013

2011
Decisional Diffie-Hellman Problem.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

2010
On Symmetric Encryption and Point Obfuscation.
IACR Cryptol. ePrint Arch., 2010

Obfuscation of Hyperplane Membership.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

2008
Non-Malleable Obfuscation.
IACR Cryptol. ePrint Arch., 2008


  Loading...