Ananth Raghunathan
Ananth Raghunathan
Facebook Inc.
Verified email at cs.stanford.edu - Homepage
Title
Cited by
Cited by
Year
Frodo: Take off the ring! practical, quantum-secure key exchange from LWE
J Bos, C Costello, L Ducas, I Mironov, M Naehrig, V Nikolaenko, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communicationsá…, 2016
2582016
Key homomorphic PRFs and their applications
D Boneh, K Lewi, H Montgomery, A Raghunathan
Annual Cryptology Conference, 410-428, 2013
1842013
Scalable private learning with pate
N Papernot, S Song, I Mironov, A Raghunathan, K Talwar, ┌ Erlingsson
arXiv preprint arXiv:1802.08908, 2018
1412018
Message-locked encryption for lock-dependent messages
M Abadi, D Boneh, I Mironov, A Raghunathan, G Segev
Annual cryptology conference, 374-391, 2013
1142013
Function-private identity-based encryption: Hiding the function in functional encryption
D Boneh, A Raghunathan, G Segev
Annual Cryptology Conference, 461-478, 2013
1062013
Prochlo: Strong privacy for analytics in the crowd
A Bittau, ┌ Erlingsson, P Maniatis, I Mironov, A Raghunathan, D Lie, ...
Proceedings of the 26th Symposium on Operating Systems Principles, 441-459, 2017
1022017
Amplification by shuffling: From local to central differential privacy via anonymity
┌ Erlingsson, V Feldman, I Mironov, A Raghunathan, K Talwar, ...
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discreteá…, 2019
542019
Deterministic public-key encryption for adaptively chosen plaintext distributions
A Raghunathan, G Segev, S Vadhan
Annual International Conference on the Theory and Applications ofá…, 2013
512013
Algebraic pseudorandom functions with improved efficiency from the augmented cascade
D Boneh, HW Montgomery, A Raghunathan
Proceedings of the 17th ACM conference on Computer and communicationsá…, 2010
512010
Function-private subspace-membership encryption and its applications
D Boneh, A Raghunathan, G Segev
International Conference on the Theory and Application of Cryptology andá…, 2013
472013
FrodoKEM
M Naehrig, E Alkim, J Bos, L Ducas, K Easterbrook, B LaMacchia, ...
Technical report, National Institute of Standards and Technology, 2017
272017
Improved constructions of PRFs secure against related-key attacks
K Lewi, H Montgomery, A Raghunathan
International Conference on Applied Cryptography and Network Security, 44-61, 2014
222014
FrodoKEM learning with errors key encapsulation
E Alkim, JW Bos, L Ducas, P Longa, I Mironov, M Naehrig, V Nikolaenko, ...
Technical report, National Institute of Standards and Technology (NIST), 2017
152017
Protecting accounts from credential stuffing with password breach alerting
K Thomas, J Pullman, K Yeo, A Raghunathan, PG Kelley, L Invernizzi, ...
28th {USENIX} Security Symposium ({USENIX} Security 19), 1556-1571, 2019
122019
Encode, shuffle, analyze privacy revisited: formalizations and empirical evaluation
┌ Erlingsson, V Feldman, I Mironov, A Raghunathan, S Song, K Talwar, ...
arXiv preprint arXiv:2001.03618, 2020
102020
Obfuscating straight line arithmetic programs
S Narayanan, A Raghunathan, R Venkatesan
Proceedings of the nineth ACM workshop on Digital rights management, 47-58, 2009
82009
Proofs in cryptography
A Raghunathan
Stanford University, 2011
72011
Deterministic Public-Key Encryption for Adaptively-Chosen Plaintext Distributions
A Raghunathan, G Segev, S Vadhan
Journal of Cryptology 31 (4), 1012-1063, 2018
42018
Privately Identifying Location Hotspots
A Raghunathan, P Chien, D Boneh
Stanford University, CA, 2012
22012
Lower Bounds for Round and Communication Complexities of Unconditional Verifiable Secret Sharing
S Narayanan, A Raghunathan, P Rangan
Dept. of Computer Science and Engineering, Indian Institute of Technology Madras, 0
2
The system can't perform the operation now. Try again later.
Articles 1–20