Shweta Agrawal
Orcid: 0000-0002-0372-6128
According to our database1,
Shweta Agrawal
authored at least 76 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Pre-Constrained Cryptography: Broad Definitions, New Constructions, Unbounded Security.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the IEEE International Symposium on Information Theory, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
2022
J. Uncertain Syst., 2022
BVFLEMR: an integrated federated learning and blockchain technology for cloud-based medical records recommendation system.
J. Cloud Comput., 2022
J. Cloud Comput., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions.
IACR Cryptol. ePrint Arch., 2022
Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality.
IACR Cryptol. ePrint Arch., 2022
Des. Codes Cryptogr., 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Secure Computation from One-Way Noisy Communication, or: Anti-correlation via Anti-concentration.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Indistinguishability Obfuscation Without Maps: Attacks and Fixes for Noisy Linear FE.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
A Practical Model for Collaborative Databases: Securely Mixing, Searching and Computing.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Theory of Cryptography - 17th International Conference, 2019
Indistinguishability Obfuscation Without Multilinear Maps: New Methods for Bootstrapping and Instantiation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Theory of Cryptography - 15th International Conference, 2017
Proceedings of the 44th International Colloquium on Automata, Languages, and Programming, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the IEEE International Symposium on Information Theory, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
2015
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
Proceedings of the Automata, Languages, and Programming - 42nd International Colloquium, 2015
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015
2014
2013
Function Private Functional Encryption and Property Preserving Encryption : New Definitions and Positive Results.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Advances in Cryptology - ASIACRYPT 2013, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 2011 IEEE Information Theory Workshop, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the IEEE International Symposium on Information Theory, 2010
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Proceedings of the Advances in Cryptology, 2010
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010
2009
Proceedings of the IEEE International Symposium on Information Theory, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2004
Proceedings of the 25th IEEE Real-Time Systems Symposium (RTSS 2004), 2004