Satrajit Ghosh

Orcid: 0000-0003-2657-5286

According to our database1, Satrajit Ghosh authored at least 15 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Threshold Private Set Intersection with Better Communication Complexity.
IACR Cryptol. ePrint Arch., 2023

Improved Distributed RSA Key Generation Using the Miller-Rabin Test.
IACR Cryptol. ePrint Arch., 2023

2022
Practical Non-malleable Codes from Symmetric-Key Primitives in 2-Split-State Model.
Proceedings of the Provable and Practical Security, 2022

2021
Uncertainty-Aware Boosted Ensembling in Multi-Modal Settings.
Proceedings of the International Joint Conference on Neural Networks, 2021

2020
Improved Primitives for MPC over Mixed Arithmetic-Binary Circuits.
IACR Cryptol. ePrint Arch., 2020

2019
The Communication Complexity of Threshold Private Set Intersection.
IACR Cryptol. ePrint Arch., 2019

2017
Maliciously Secure Oblivious Linear Function Evaluation with Constant Overhead.
IACR Cryptol. ePrint Arch., 2017

An Algebraic Approach to Maliciously Secure Private Set Intersection.
IACR Cryptol. ePrint Arch., 2017

TinyOLE: Efficient Actively Secure Two-Party Computation from Oblivious Linear Function Evaluation.
IACR Cryptol. ePrint Arch., 2017

2015
Post-Quantum Secure Onion Routing (Future Anonymity in Today's Budget).
IACR Cryptol. ePrint Arch., 2015

Post-Quantum Forward-Secure Onion Routing - (Future Anonymity in Today's Budget).
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Algorithms for rotation symmetric Boolean functions.
Int. J. Inf. Coding Theory, 2014

2012
Improvements of Algebraic Attacks Based on Structured Gaussian Elimination.
IACR Cryptol. ePrint Arch., 2012

A novel approach for identification of symmetric switching function.
Proceedings of the 1st International Conference on Recent Advances in Information Technology, 2012

2011
An Improvement of Linearization-Based Algebraic Attacks.
Proceedings of the Security Aspects in Information Technology, 2011


  Loading...