| Practical, round-optimal lattice-based blind signatures S Agrawal, E Kirshanova, D Stehlé, A Yadav Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 88* | 2022 |
| Round-optimal lattice-based threshold signatures, revisited S Agrawal, D Stehlé, A Yadav Cryptology ePrint Archive, 2022 | 75* | 2022 |
| Multi-input attribute based encryption and predicate encryption S Agrawal, A Yadav, S Yamada Annual International Cryptology Conference, 590-621, 2022 | 34 | 2022 |
| Constant input attribute based (and predicate) encryption from evasive and tensor LWE S Agrawal, M Rossi, A Yadav, S Yamada Annual International Cryptology Conference, 532-564, 2023 | 30 | 2023 |
| Attribute-Based Multi-input FE (and More) for Attribute-Weighted Sums S Agrawal, J Tomida, A Yadav Annual International Cryptology Conference, 464-497, 2023 | 22 | 2023 |
| Evasive LWE: Attacks, Variants & Obfustopia S Agrawal, A Modi, A Yadav, S Yamada Cryptology ePrint Archive, 2025 | 14 | 2025 |
| Broadcast, Trace and Revoke with Optimal Parameters from Polynomial Hardness S Agrawal, S Kumari, A Yadav, S Yamada Annual International Conference on the Theory and Applications of …, 2023 | 13 | 2023 |
| Towards practical and round-optimal lattice-based threshold and blind signatures S Agrawal, D Stehlé, A Yadav Cryptology ePrint Archive, 2021 | 10 | 2021 |
| Strongly Secure Universal Thresholdizer E Ebrahimi, A Yadav International Conference on the Theory and Application of Cryptology and …, 2024 | 6 | 2024 |
| Dynamic server consolidation algorithms: a profit model for evaluation and an improvement A Yadav, V Apte Proceedings of the 17th International Conference on Distributed Computing …, 2016 | 1 | 2016 |
| Towards formal analysis of key control in group key agreement protocols A Yadav, A Mathuria International Conference on Security, Privacy, and Applied Cryptography …, 2012 | 1 | 2012 |
| Round Optimal Blind Signatures: Short Signatures with Post-Quantum Blindness S Agrawal, JH Cheon, H Choe, D Stehlé, A Yadav Cryptology ePrint Archive, 2022 | | 2022 |
| Modeling and detecting attacks against key agreement protocols A Yadav Dhirubhai Ambani Institute of Information and Communication Technology, 2012 | | 2012 |