Follow
Sidharth Telang
Sidharth Telang
Verified email at cs.cornell.edu
Title
Cited by
Cited by
Year
Indistinguishability obfuscation from semantically-secure multilinear encodings
R Pass, K Seth, S Telang
Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014
2022014
Indistinguishability obfuscation from semantically-secure multilinear encodings
R Pass, K Seth, S Telang
Advances in Cryptology–CRYPTO 2014, 500-517, 2014
2022014
Succinct randomized encodings and their applications
N Bitansky, S Garg, S Telang
Proceedings of the 47th annual ACM symposium on Symposium on theory of computing, 2015
1432015
Indistinguishability obfuscation with non-trivial efficiency
H Lin, R Pass, K Seth, S Telang
Public-Key Cryptography--PKC 2016, 447-462, 2016
622016
Output-compressing randomized encodings and applications
H Lin, R Pass, K Seth, S Telang
Theory of Cryptography Conference, 96-124, 2015
492015
Indistinguishability obfuscation for RAM programs and succinct randomized encodings
N Bitansky, R Canetti, S Garg, J Holmgren, A Jain, H Lin, R Pass, ...
SIAM Journal on Computing 47 (3), 1123-1210, 2018
222018
Randomness-dependent message security
E Birrell, KM Chung, R Pass, S Telang
Theory of Cryptography: 10th Theory of Cryptography Conference, TCC 2013 …, 2013
192013
Knowledge-preserving interactive coding
KM Chung, R Pass, S Telang
2013 IEEE 54th Annual Symposium on Foundations of Computer Science, 449-458, 2013
182013
Congestion lower bounds for secure in-network aggregation
R Bhaskar, R Jaiswal, S Telang
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
72012
Interactive coding
KM Chung, R Pass, S Telang
revisited. Cryptology ePrint Archive, Report 2013/160, 2013
32013
On Program Obfuscation
S Telang
2016
The system can't perform the operation now. Try again later.
Articles 1–11