Nirvan Tyagi
Nirvan Tyagi
Verified email at - Homepage
Cited by
Cited by
Stadium: A distributed metadata-private messaging system
N Tyagi, Y Gilad, D Leung, M Zaharia, N Zeldovich
Proceedings of the 26th Symposium on Operating Systems Principles, 423-440, 2017
Proofs for inner pairing products and applications
B BŁnz, M Maller, P Mishra, N Tyagi, P Vesely
International Conference on the Theory and Application of Cryptology and†…, 2021
Energy-efficient algorithms
ED Demaine, J Lynch, GJ Mirano, N Tyagi
Proceedings of the 2016 ACM Conference on Innovations in Theoretical†…, 2016
Traceback for End-to-End Encrypted Messaging
N Tyagi, I Miers, T Ristenpart
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications†…, 2019
Asymmetric message franking: content moderation for metadata-private end-to-end encryption
N Tyagi, P Grubbs, J Len, I Miers, T Ristenpart
CRYPTO, 222-250, 2019
Toward an energy efficient language and compiler for (partially) reversible algorithms
N Tyagi, J Lynch, ED Demaine
International Conference on Reversible Computation, 121-136, 2016
Handling adaptive compromise for practical encryption schemes
J Jaeger, N Tyagi
Annual International Cryptology Conference, 3-32, 2020
Burnbox: Self-revocable encryption in a world of compelled access
N Tyagi, MH Mughees, T Ristenpart, I Miers
27th {USENIX} Security Symposium ({USENIX} Security 18), 445-461, 2018
Client-auditable verifiable registries
N Tyagi, B Fisch, J Bonneau, S Tessaro
Cryptology ePrint Archive, 2021
Orca: Blocklisting in Sender-Anonymous Messaging
N Tyagi, J Len, I Miers, T Ristenpart, C Tech
Cryptology ePrint Archive, 2021
A Fast and Simple Partially Oblivious PRF, with Applications
N Tyagi, T Ristenpart, N Sullivan, S Tessaro, CA Wood
Cryptology ePrint Archive, 2021
The system can't perform the operation now. Try again later.
Articles 1–11