Founding cryptography on tamper-proof hardware tokens V Goyal, Y Ishai, A Sahai, R Venkatesan, A Wadia Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010 | 229 | 2010 |
Universally composable secure computation with (malicious) physically uncloneable functions R Ostrovsky, A Scafuro, I Visconti, A Wadia Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013 | 94 | 2013 |
Two-message witness indistinguishability and secure computation in the plain model from new assumptions S Badrinarayanan, S Garg, Y Ishai, A Sahai, A Wadia International Conference on the Theory and Application of Cryptology and …, 2017 | 73 | 2017 |
Identifying genetic relatives without compromising privacy D He, NA Furlotte, F Hormozdiari, JWJ Joo, A Wadia, R Ostrovsky, ... Genome research 24 (4), 664-672, 2014 | 46 | 2014 |
Resettable statistical zero knowledge S Garg, R Ostrovsky, I Visconti, A Wadia Theory of Cryptography Conference, 494-511, 2012 | 23 | 2012 |
Privacy preserving protocol for detecting genetic relatives using rare variants F Hormozdiari, JWJ Joo, A Wadia, F Guan, R Ostrosky, A Sahai, E Eskin Bioinformatics 30 (12), i204-i211, 2014 | 21 | 2014 |
Private interactive communication across an adversarial channel R Gelles, A Sahai, A Wadia Proceedings of the 5th conference on Innovations in theoretical computer …, 2014 | 17 | 2014 |
A counterexample to the chain rule for conditional HILL entropy: and what deniable encryption has to do with it S Krenn, K Pietrzak, A Wadia Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013 | 15 | 2013 |
Cryptography using captcha puzzles A Kumarasubramanian, R Ostrovsky, O Pandey, A Wadia International Workshop on Public Key Cryptography, 89-106, 2013 | 12 | 2013 |
A counterexample to the chain rule for conditional HILL entropy S Krenn, K Pietrzak, A Wadia, D Wichs computational complexity 25, 567-605, 2016 | 4 | 2016 |
Secure computation using leaky tokens M Prabhakaran, A Sahai, A Wadia Automata, Languages, and Programming: 41st International Colloquium, ICALP …, 2014 | 3 | 2014 |
Secure Computation from Hardware Assumptions A Wadia University of California, Los Angeles, 2014 | | 2014 |
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions A Wadia | | |
Rafail Ostrovsky-Publications F Hormozdiari, JWJ Joo, A Wadia, F Guan | | |