Note: Publications in cryptography/theory order authors alphabetically according to their last names.


Google Scholar

Semantic Scholar

Peer Reviewed

  1. Amortized Threshold Symmetric-key Encryption
    with Mihai Christodorescu, Sivanarayana Gaddam, Rohit Sinha
    to appear in CCS 2021.
  2. BETA: Biometric Enabled Threshold Authentication [ePrint, pdf]
    with Shashank Agrawal, Saikrishna Badrinarayanan, Payman Mohassel, Sikhar Patranabis
    to appear in PKC 2021.
  3. Adaptively secure Threshold Symmetric-key Encryption [ePrint, pdf ,video]
    in INDOCRYPT 2020.
  4. Reusable Two-Round MPC from DDH [ePrint, pdf ,video]
    with James Bartusek, Sanjam Garg, Daniel Masny 
    in TCC 2020.
  5. Game-Set-MATCH: Using Mobile Devices for Seamless External-Facing Biometric Matching [ePrint, pdf]
    with Shashank Agrawal, Saikrishna Badrinarayanan, Peter Rindal
    in CCS 2020.
  6. Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures [ePrint, pdf]
    with Yilei Chen, Nicholas Genise
    in ASIACRYPT 2019 [proceeding]
    preliminary version in Second NIST PQC Standardization Conference [pdf].
  7. Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space [ePrint, pdf]
    with Binyi Chen, Yilei Chen, Kristina Hostáková
    in CRYPTO 2019 [proceeding, video].
  8. Obfuscation from Low Noise Multilinear Maps [ePrint, pdf]
    with Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao
    in INDOCRYPT 2018 [proceeding].
  9. DiSE: Distributed Symmetric-key Encryption [ePrint, pdf, video]
    with Shashank Agrawal, Payman Mohassel, Peter Rindal
    in CCS 2018 [proceeding].
    extended abstract accepted in Real World Crypto, 2020 [video].
  10. PASTA: PASsword-based Threshold Authentication [ePrint, pdf, shorter video, longer video]
    with Shashank Agrawal, Peihan Miao, Payman Mohassel
    in CCS 2018 [proceeding].
  11. Non-Malleable Codes for Space-Bounded Tampering [ePrint, pdf, video]
    with Sebastian Faust, Kristina Hostáková, Daniele Venturi
    in CRYPTO 2017 [proceeding].
  12. Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13 [ePrint, pdf]
    with Daniel Apon, Nico Döttling, Sanjam Garg
    in ICALP 2017 (Track-A) [proceeding].
  13. Secure Obfuscation in a Weak Multilinear Map Model [ePrint, pdf]
    with Sanjam Garg, Eric Miles, Amit Sahai, Akshayaram Srinivasan, Mark Zhandry
    in TCC 2016-B [proceeding]. (merger of GMS and MSZ)
  14. Block-wise Non-malleable Codes [ePrint, pdf]
    with Nishanth Chandran, Vipul Goyal, Omkant Pandey, Jalaj Upadhyay
    in ICALP 2016 (Track-A) [proceeding].
  15. Two Round Multi-party Computation via Multi-Key FHE [ePrint, pdf, video]
    with Daniel Wichs
    in EUROCRYPT 2016 [proceeding].
  16. The Exact Round Complexity of Secure Computation[ePrint, pdf, video]
    with Sanjam Garg, Omkant Pandey, Antigoni Polychroniadou
    in EUROCRYPT 2016 [proceeding].
  17. The Chaining Lemma and its application [ePrint, pdf, slides]
    with Ivan Damgård, Sebastian Faust, Daniele Venturi
    in ICITS 2015 [proceeding].
  18. A Tamper and Leakage Resilient von Neumann Architecture [ePrint, pdf, slides]
    with Sebastian Faust, Jesper Buus Nielsen, Daniele Venturi
    in PKC 2015 [proceeding].
  19. Non-Adaptive Programmability of Random Oracle [pdf]
    with Rishiraj Bhattacharyya
    in Theoretical Computer Science 2015 [journal].
  20. Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits [ePrint, pdf, slides]
    with Sebastian Faust, Daniele Venturi, Daniel Wichs.
    in EUROCRYPT 2014 [proceeding]
    extended version in IEEE Transactions on Information Theory 2016 [journal].
  21. Continuous Non-malleable Codes [ePrint, pdf, slides, video]
    with Sebastian Faust, Jesper Buus Nielsen, Daniele Venturi
    in TCC 2014 [proceeding]
    extended version in Journal of Cryptology 2020 [journal].
  22. Bounded Tamper Resilience: How to go beyond the Algebraic Barrier [ePrint, pdf, slides]
    with Ivan Damgård, Sebastian Faust, Daniele Venturi
    in ASIACRYPT 2013 [proceeding]
    extended version in Journal of Cryptology 2017 [journal].


  • Protecting Cryptographic Memory against Tampering Attack [pdf, slides]
    PhD Thesis, Aarhus Universitet, 2015.
  • An Overview of eSTREAM Ciphers [pdf]
    Survey, Centre of Excellence in Cryptology, Indian Statistical Institute, 2012.
  • Parallelization of the Wiedemann Large Sparse System Solver over Large Prime Fields [pdf, slides]
    Master’s Thesis supervised by Abhijit Das, IIT Kharagpur, 2011.