Indistinguishability obfuscation from semantically-secure multilinear encodings R Pass, K Seth, S Telang Advances in Cryptology–CRYPTO 2014, 500-517, 2014 | 209 | 2014 |
Succinct randomized encodings and their applications N Bitansky, S Garg, S Telang Proceedings of the 47th annual ACM symposium on Symposium on theory of computing, 2015 | 153 | 2015 |
Indistinguishability obfuscation with non-trivial efficiency H Lin, R Pass, K Seth, S Telang Public-Key Cryptography--PKC 2016, 447-462, 2016 | 69 | 2016 |
Output-compressing randomized encodings and applications H Lin, R Pass, K Seth, S Telang Theory of Cryptography Conference, 96-124, 2015 | 52 | 2015 |
Indistinguishability obfuscation for RAM programs and succinct randomized encodings N Bitansky, R Canetti, S Garg, J Holmgren, A Jain, H Lin, R Pass, ... SIAM Journal on Computing 47 (3), 1123-1210, 2018 | 24 | 2018 |
Knowledge-preserving interactive coding KM Chung, R Pass, S Telang 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, 449-458, 2013 | 19 | 2013 |
Randomness-dependent message security E Birrell, KM Chung, R Pass, S Telang Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013 | 19 | 2013 |
Congestion lower bounds for secure in-network aggregation R Bhaskar, R Jaiswal, S Telang Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012 | 7 | 2012 |
Interactive coding KM Chung, R Pass, S Telang revisited. Cryptology ePrint Archive, Report 2013/160, 2013 | 3 | 2013 |
On Program Obfuscation S Telang | | 2016 |