Suivre
Ananth Raghunathan
Ananth Raghunathan
Facebook Inc.
Adresse e-mail validée de cs.stanford.edu - Page d'accueil
Titre
Citée par
Citée par
Année
Scalable private learning with pate
N Papernot, S Song, I Mironov, A Raghunathan, K Talwar, Ú Erlingsson
arXiv preprint arXiv:1802.08908, 2018
7282018
Prochlo: Strong privacy for analytics in the crowd
A Bittau, Ú Erlingsson, P Maniatis, I Mironov, A Raghunathan, D Lie, ...
Proceedings of the 26th symposium on operating systems principles, 441-459, 2017
5042017
Frodo: Take off the ring! practical, quantum-secure key exchange from LWE
J Bos, C Costello, L Ducas, I Mironov, M Naehrig, V Nikolaenko, ...
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
4952016
Amplification by shuffling: From local to central differential privacy via anonymity
Ú Erlingsson, V Feldman, I Mironov, A Raghunathan, K Talwar, ...
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete …, 2019
4762019
Key homomorphic PRFs and their applications
D Boneh, K Lewi, H Montgomery, A Raghunathan
Annual Cryptology Conference, 410-428, 2013
4012013
Information leakage in embedding models
C Song, A Raghunathan
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
2302020
Message-locked encryption for lock-dependent messages
M Abadi, D Boneh, I Mironov, A Raghunathan, G Segev
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
1712013
Protecting accounts from credential stuffing with password breach alerting
K Thomas, J Pullman, K Yeo, A Raghunathan, PG Kelley, L Invernizzi, ...
28th USENIX Security Symposium (USENIX Security 19), 1556-1571, 2019
1612019
Function-private identity-based encryption: Hiding the function in functional encryption
D Boneh, A Raghunathan, G Segev
Advances in Cryptology–CRYPTO 2013: 33rd Annual Cryptology Conference, Santa …, 2013
1472013
Encode, shuffle, analyze privacy revisited: Formalizations and empirical evaluation
Ú Erlingsson, V Feldman, I Mironov, A Raghunathan, S Song, K Talwar, ...
arXiv preprint arXiv:2001.03618, 2020
1002020
FrodoKEM
M Naehrig, E Alkim, J Bos, L Ducas, K Easterbrook, B LaMacchia, ...
National Institute of Standards and Technology (2017), 2017
902017
Algebraic pseudorandom functions with improved efficiency from the augmented cascade
D Boneh, HW Montgomery, A Raghunathan
Proceedings of the 17th ACM conference on Computer and communications …, 2010
752010
Function-private subspace-membership encryption and its applications
D Boneh, A Raghunathan, G Segev
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
672013
Deterministic public-key encryption for adaptively chosen plaintext distributions
A Raghunathan, G Segev, S Vadhan
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
602013
FrodoKEM learning with errors key encapsulation
E Alkim, JW Bos, L Ducas, P Longa, I Mironov, M Naehrig, V Nikolaenko, ...
NIST PQC standardization: Round 3, 10-20, 2020
572020
FrodoKEM learning with errors key encapsulation algorithm specifications and supporting documentation
E Alkim, JW Bos, L Ducas, P Longa, I Mironov, M Naehrig, V Nikolaenko, ...
NIST submissions, 2019
422019
Improved constructions of PRFs secure against related-key attacks
K Lewi, H Montgomery, A Raghunathan
Applied Cryptography and Network Security: 12th International Conference …, 2014
302014
That which we call private
Ú Erlingsson, I Mironov, A Raghunathan, S Song
arXiv preprint arXiv:1908.03566, 2019
202019
Dit: De-identified authenticated telemetry at scale
S Huang, S Iyengar, S Jeyaraman, S Kushwah, CK Lee, Z Luo, ...
Technical report, Facebook Inc 39, 8562-6, 2021
92021
Deterministic public-key encryption for adaptively-chosen plaintext distributions
A Raghunathan, G Segev, S Vadhan
Journal of Cryptology 31, 1012-1063, 2018
82018
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20