Note: Publications in cryptography/theory order authors alphabetically according to their last names.

Google Scholar


Peer Reviewed

  1. Approximate Trapdoors for Lattices and Smaller Hash-and-Sign Signatures [ePrint, pdf]
    with Yilei Chen, Nicholas Genise
    in ASIACRYPT 2019 [proceeding]
    preliminary version in Second NIST PQC Standardization Conference [pdf].
  2. Continuous Space-Bounded Non-Malleable Codes from Stronger Proofs-of-Space [ePrint, pdf]
    with Binyi Chen, Yilei Chen, Kristina Hostáková
    in CRYPTO 2019 [proceeding, video].
  3. Obfuscation from Low Noise Multilinear Maps [ePrint, pdf]
    with Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao
    in INDOCRYPT 2018 [proceeding].
  4. DiSE: Distributed Symmetric-key Encryption [ePrint, pdf, video]
    with Shashank Agrawal, Payman Mohassel, Peter Rindal
    in ACM CCS 2018 [proceeding].
    extended abstract accepted in Real World Crypto, 2020 [video].
  5. PASTA: PASsword-based Threshold Authentication [ePrint, pdf, shorter video, longer video]
    with Shashank Agrawal, Peihan Miao, Payman Mohassel
    in ACM CCS 2018 [proceeding].
  6. Non-Malleable Codes for Space-Bounded Tampering [ePrint, pdf, video]
    with Sebastian Faust, Kristina Hostáková, Daniele Venturi
    in CRYPTO 2017 [proceeding].
  7. Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13 [ePrint, pdf]
    with Daniel Apon, Nico Döttling, Sanjam Garg
    in ICALP 2017 (Track-A) [proceeding].
  8. Secure Obfuscation in a Weak Multilinear Map Model [ePrint, pdf]
    with Sanjam Garg, Eric Miles, Amit Sahai, Akshayaram Srinivasan, Mark Zhandry
    in TCC 2016-B [proceeding]. (merger of GMS and MSZ)
  9. Block-wise Non-malleable Codes [ePrint, pdf]
    with Nishanth Chandran, Vipul Goyal, Omkant Pandey, Jalaj Upadhyay
    in ICALP 2016 (Track-A) [proceeding].
  10. Two Round Multi-party Computation via Multi-Key FHE [ePrint, pdf, video]
    with Daniel Wichs
    in EUROCRYPT 2016 [proceeding].
  11. The Exact Round Complexity of Secure Computation[ePrint, pdf, video]
    with Sanjam Garg, Omkant Pandey, Antigoni Polychroniadou
    in EUROCRYPT 2016 [proceeding].
  12. The Chaining Lemma and its application [ePrint, pdf, slides]
    with Ivan Damgård, Sebastian Faust, Daniele Venturi
    in ICITS 2015 [proceeding].
  13. A Tamper and Leakage Resilient von Neumann Architecture [ePrint, pdf, slides]
    with Sebastian Faust, Jesper Buus Nielsen, Daniele Venturi
    in PKC 2015 [proceeding].
  14. Non-Adaptive Programmability of Random Oracle [pdf]
    with Rishiraj Bhattacharyya
    in Theoretical Computer Science 2015 [journal].
  15. Efficient Non-Malleable Codes and Key-Derivation for Poly-Size Tampering Circuits [ePrint, pdf, slides]
    with Sebastian Faust, Daniele Venturi, Daniel Wichs.
    in EUROCRYPT 2014 [proceeding]
    extended version in IEEE Transactions on Information Theory 2016 [journal].
  16. Continuous Non-malleable Codes [ePrint, pdf, slides, video]
    with Sebastian Faust, Jesper Buus Nielsen, Daniele Venturi
    in TCC 2014 [proceeding].
  17. Bounded Tamper Resilience: How to go beyond the Algebraic Barrier [ePrint, pdf, slides]
    with Ivan Damgård, Sebastian Faust, Daniele Venturi
    in ASIACRYPT 2013 [proceeding]
    extended version in Journal of Cryptology 2017 [journal].


  • Protecting Cryptographic Memory against Tampering Attack [pdf, slides]
    PhD Thesis, Aarhus Universitet, 2015.
  • An Overview of eSTREAM Ciphers [pdf]
    Survey, Centre of Excellence in Cryptology, Indian Statistical Institute, 2012.
  • Parallelization of the Wiedemann Large Sparse System Solver over Large Prime Fields [pdf, slides]
    Master’s Thesis supervised by Abhijit Das, IIT Kharagpur, 2011.