Follow
Akshay Wadia
Title
Cited by
Cited by
Year
Founding cryptography on tamper-proof hardware tokens
V Goyal, Y Ishai, A Sahai, R Venkatesan, A Wadia
Theory of Cryptography: 7th Theory of Cryptography Conference, TCC 2010 …, 2010
2292010
Universally composable secure computation with (malicious) physically uncloneable functions
R Ostrovsky, A Scafuro, I Visconti, A Wadia
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
942013
Two-message witness indistinguishability and secure computation in the plain model from new assumptions
S Badrinarayanan, S Garg, Y Ishai, A Sahai, A Wadia
International Conference on the Theory and Application of Cryptology and …, 2017
732017
Identifying genetic relatives without compromising privacy
D He, NA Furlotte, F Hormozdiari, JWJ Joo, A Wadia, R Ostrovsky, ...
Genome research 24 (4), 664-672, 2014
462014
Resettable statistical zero knowledge
S Garg, R Ostrovsky, I Visconti, A Wadia
Theory of Cryptography Conference, 494-511, 2012
232012
Privacy preserving protocol for detecting genetic relatives using rare variants
F Hormozdiari, JWJ Joo, A Wadia, F Guan, R Ostrosky, A Sahai, E Eskin
Bioinformatics 30 (12), i204-i211, 2014
212014
Private interactive communication across an adversarial channel
R Gelles, A Sahai, A Wadia
Proceedings of the 5th conference on Innovations in theoretical computer …, 2014
172014
A counterexample to the chain rule for conditional HILL entropy: and what deniable encryption has to do with it
S Krenn, K Pietrzak, A Wadia
Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013
152013
Cryptography using captcha puzzles
A Kumarasubramanian, R Ostrovsky, O Pandey, A Wadia
International Workshop on Public Key Cryptography, 89-106, 2013
122013
A counterexample to the chain rule for conditional HILL entropy
S Krenn, K Pietrzak, A Wadia, D Wichs
computational complexity 25, 567-605, 2016
42016
Secure computation using leaky tokens
M Prabhakaran, A Sahai, A Wadia
Automata, Languages, and Programming: 41st International Colloquium, ICALP …, 2014
32014
Secure Computation from Hardware Assumptions
A Wadia
University of California, Los Angeles, 2014
2014
Two-Message Witness Indistinguishability and Secure Computation in the Plain Model from New Assumptions
A Wadia
Rafail Ostrovsky-Publications
F Hormozdiari, JWJ Joo, A Wadia, F Guan
The system can't perform the operation now. Try again later.
Articles 1–14