[go: up one dir, main page]

Follow
Anshu Yadav
Anshu Yadav
Verified email at ist.ac.at
Title
Cited by
Cited by
Year
Practical, round-optimal lattice-based blind signatures
S Agrawal, E Kirshanova, D Stehlé, A Yadav
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
88*2022
Round-optimal lattice-based threshold signatures, revisited
S Agrawal, D Stehlé, A Yadav
Cryptology ePrint Archive, 2022
75*2022
Multi-input attribute based encryption and predicate encryption
S Agrawal, A Yadav, S Yamada
Annual International Cryptology Conference, 590-621, 2022
342022
Constant input attribute based (and predicate) encryption from evasive and tensor LWE
S Agrawal, M Rossi, A Yadav, S Yamada
Annual International Cryptology Conference, 532-564, 2023
302023
Attribute-Based Multi-input FE (and More) for Attribute-Weighted Sums
S Agrawal, J Tomida, A Yadav
Annual International Cryptology Conference, 464-497, 2023
222023
Evasive LWE: Attacks, Variants & Obfustopia
S Agrawal, A Modi, A Yadav, S Yamada
Cryptology ePrint Archive, 2025
142025
Broadcast, Trace and Revoke with Optimal Parameters from Polynomial Hardness
S Agrawal, S Kumari, A Yadav, S Yamada
Annual International Conference on the Theory and Applications of …, 2023
132023
Towards practical and round-optimal lattice-based threshold and blind signatures
S Agrawal, D Stehlé, A Yadav
Cryptology ePrint Archive, 2021
102021
Strongly Secure Universal Thresholdizer
E Ebrahimi, A Yadav
International Conference on the Theory and Application of Cryptology and …, 2024
62024
Dynamic server consolidation algorithms: a profit model for evaluation and an improvement
A Yadav, V Apte
Proceedings of the 17th International Conference on Distributed Computing …, 2016
12016
Towards formal analysis of key control in group key agreement protocols
A Yadav, A Mathuria
International Conference on Security, Privacy, and Applied Cryptography …, 2012
12012
Round Optimal Blind Signatures: Short Signatures with Post-Quantum Blindness
S Agrawal, JH Cheon, H Choe, D Stehlé, A Yadav
Cryptology ePrint Archive, 2022
2022
Modeling and detecting attacks against key agreement protocols
A Yadav
Dhirubhai Ambani Institute of Information and Communication Technology, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–13