Pratyay Mukherjee
Pratyay Mukherjee
Visa Research
Verified email at visa.com - Homepage
TitleCited byYear
Two round multiparty computation via multi-key FHE
P Mukherjee, D Wichs
Annual International Conference on the Theory and Applications of …, 2016
150*2016
Efficient non-malleable codes and key derivation for poly-size tampering circuits
S Faust, P Mukherjee, D Venturi, D Wichs
IEEE Transactions on Information Theory 62 (12), 7179-7194, 2016
922016
Continuous non-malleable codes
S Faust, P Mukherjee, JB Nielsen, D Venturi
Theory of Cryptography Conference, 465-488, 2014
922014
Secure obfuscation in a weak multilinear map model
S Garg, E Miles, P Mukherjee, A Sahai, A Srinivasan, M Zhandry
Theory of Cryptography Conference, 241-268, 2016
712016
The exact round complexity of secure computation
S Garg, P Mukherjee, O Pandey, A Polychroniadou
Annual International Conference on the Theory and Applications of …, 2016
482016
Bounded tamper resilience: How to go beyond the algebraic barrier
I Damgård, S Faust, P Mukherjee, D Venturi
Journal of Cryptology 30 (1), 152-190, 2017
422017
Block-wise non-malleable codes
N Chandran, V Goyal, P Mukherjee, O Pandey, J Upadhyay
43rd International Colloquium on Automata, Languages, and Programming (ICALP …, 2016
392016
A Tamper and Leakage Resilient von Neumann Architecture
S Faust, P Mukherjee, JB Nielsen, D Venturi
IACR Cryptology ePrint Archive, 2014: 338, 2014
35*2014
Cryptanalysis of indistinguishability obfuscations of circuits over GGH13
D Apon, N Döttling, S Garg, P Mukherjee
44th International Colloquium on Automata, Languages, and Programming (ICALP …, 2017
342017
Obfuscation without the Vulnerabilities of Multilinear Maps.
S Garg, P Mukherjee, A Srinivasan
IACR Cryptology ePrint Archive 2016, 390, 2016
282016
The chaining lemma and its application
I Damgård, S Faust, P Mukherjee, D Venturi
International Conference on Information Theoretic Security, 181-196, 2015
20*2015
Non-malleable codes for space-bounded tampering
S Faust, K Hostáková, P Mukherjee, D Venturi
Annual International Cryptology Conference, 95-126, 2017
162017
Obfuscation from low noise multilinear maps
N Döttling, S Garg, D Gupta, P Miao, P Mukherjee
International Conference on Cryptology in India, 329-352, 2018
152018
An overview of eSTREAM ciphers
P Mukherjee
Centre of Excellence in Cryptology, Indian Statistical Institute, Kolkata, India, 2013
82013
DiSE: distributed symmetric-key encryption
S Agrawal, P Mohassel, P Mukherjee, P Rindal
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
72018
Non-adaptive programmability of random oracle
R Bhattacharyya, P Mukherjee
Theoretical Computer Science 592, 97-114, 2015
62015
PASTA: PASsword-based Threshold Authentication
S Agrawal, P Miao, P Mohassel, P Mukherjee
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
32018
Protecting cryptographic memory against tampering attack
P Mukherjee
Department Office Computer Science, Aarhus University, 2015
22015
Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures
Y Chen, N Genise, P Mukherjee
International Conference on the Theory and Application of Cryptology and …, 2019
2019
Continuous space-bounded non-malleable codes from stronger proofs-of-space
B Chen, Y Chen, K Hostáková, P Mukherjee
Annual International Cryptology Conference, 467-495, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20