| Efficient lattice (H) IBE in the standard model S Agrawal, D Boneh, X Boyen Annual International Conference on the Theory and Applications of …, 2010 | 1382 | 2010 |
| Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE S Agrawal, D Boneh, X Boyen Annual cryptology conference, 98-115, 2010 | 568 | 2010 |
| Fully secure functional encryption for inner products, from standard assumptions S Agrawal, B Libert, D Stehlé Annual International Cryptology Conference, 333-362, 2016 | 408 | 2016 |
| Homomorphic MACs: MAC-based integrity for network coding S Agrawal, D Boneh International conference on applied cryptography and network security, 292-305, 2009 | 380 | 2009 |
| Functional encryption for inner product predicates from learning with errors S Agrawal, DM Freeman, V Vaikuntanathan International Conference on the Theory and Application of Cryptology and …, 2011 | 308 | 2011 |
| Functional encryption: New perspectives and lower bounds S Agrawal, S Gorbunov, V Vaikuntanathan, H Wee Annual Cryptology Conference, 500-518, 2013 | 220 | 2013 |
| Functional encryption for threshold functions (or fuzzy IBE) from lattices S Agrawal, X Boyen, V Vaikuntanathan, P Voulgaris, H Wee International Workshop on Public Key Cryptography, 280-297, 2012 | 196 | 2012 |
| Optimal broadcast encryption from pairings and LWE S Agrawal, S Yamada Annual International Conference on the Theory and Applications of …, 2020 | 101 | 2020 |
| Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation S Agrawal Annual International Conference on the Theory and Applications of …, 2019 | 98 | 2019 |
| Stronger security for reusable garbled circuits, general definitions and attacks S Agrawal Annual international cryptology conference, 3-35, 2017 | 92 | 2017 |
| Practical, round-optimal lattice-based blind signatures S Agrawal, E Kirshanova, D Stehlé, A Yadav Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 75 | 2022 |
| Adaptive simulation security for inner product functional encryption S Agrawal, B Libert, M Maitra, R Titiu IACR International Conference on Public-Key Cryptography, 34-64, 2020 | 75 | 2020 |
| Discrete gaussian leftover hash lemma over infinite domains S Agrawal, C Gentry, S Halevi, A Sahai International Conference on the Theory and Application of Cryptology and …, 2013 | 74 | 2013 |
| Privacy and security of Aadhaar: a computer science perspective S Agrawal, S Banerjee, S Sharma Economic and Political Weekly, 93-102, 2017 | 68 | 2017 |
| Indistinguishability obfuscation without maps: Attacks and fixes for noisy linear FE S Agrawal, A Pellet-Mary Annual International Conference on the Theory and Applications of …, 2020 | 66 | 2020 |
| Preventing pollution attacks in multi-source network coding S Agrawal, D Boneh, X Boyen, DM Freeman International Workshop on Public Key Cryptography, 161-176, 2010 | 65 | 2010 |
| Functional encryption for bounded collusions, revisited S Agrawal, A Rosen Theory of Cryptography Conference, 173-205, 2017 | 63 | 2017 |
| Round-optimal lattice-based threshold signatures, revisited S Agrawal, D Stehlé, A Yadav Cryptology ePrint Archive, 2022 | 61 | 2022 |
| Efficient public trace and revoke from standard assumptions S Agrawal, S Bhattacherjee, DH Phan, D Stehlé, S Yamada Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017 | 60 | 2017 |
| Secrecy using compressive sensing S Agrawal, S Vishwanath 2011 IEEE Information Theory Workshop, 563-567, 2011 | 60 | 2011 |