Follow
Chethan Kamath
Chethan Kamath
Verified email at cse.iitb.ac.in - Homepage
Title
Cited by
Cited by
Year
Keep the dirt: Tainted treekem, adaptively and actively secure continuous group key agreement
K Klein, G Pascual-Perez, M Walter, C Kamath, M Capretto, M Cueto, ...
2021 IEEE Symposium on Security and Privacy (SP), 268-284, 2021
55*2021
Finding a Nash equilibrium is no easier than breaking Fiat-Shamir
AR Choudhuri, P Hubáček, C Kamath, K Pietrzak, A Rosen, GN Rothblum
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing …, 2019
502019
Be adaptive, avoid overcommitting
Z Jafargholi, C Kamath, K Klein, I Komargodski, K Pietrzak, D Wichs
Annual International Cryptology Conference, 133-163, 2017
502017
On the complexity of scrypt and proofs of space in the parallel random oracle model
J Alwen, B Chen, C Kamath, V Kolmogorov, K Pietrzak, S Tessaro
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
472016
Practical round-optimal blind signatures in the standard model from weaker assumptions
G Fuchsbauer, C Hanser, C Kamath, D Slamanig
International Conference on Security and Cryptography for Networks, 391-408, 2016
342016
Adaptively secure proxy re-encryption
G Fuchsbauer, C Kamath, K Klein, K Pietrzak
IACR International Workshop on Public Key Cryptography, 317-346, 2019
332019
PPAD-hardness via iterated squaring modulo a composite
AR Choudhuri, P Hubácek, C Kamath, K Pietrzak, A Rosen, GN Rothblum
Cryptology ePrint Archive, 2019
292019
Galindo-Garcia identity-based signature revisited
S Chatterjee, C Kamath, V Kumar
International Conference on Information Security and Cryptology, 456-471, 2012
262012
On the memory-hardness of data-independent password-hashing functions
J Alwen, P Gazi, C Kamath, K Klein, G Osang, K Pietrzak, L Reyzin, ...
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
192018
Reversible proofs of sequential work
H Abusalah, C Kamath, K Klein, K Pietrzak, M Walter
Annual International Conference on the Theory and Applications of …, 2019
152019
PPAD is as Hard as LWE and Iterated Squaring
N Bitansky, AR Choudhuri, J Holmgren, C Kamath, A Lombardi, O Paneth, ...
Theory of Cryptography Conference, 593-622, 2022
112022
Practical statistically-sound proofs of exponentiation in any group
C Hoffmann, P Hubáček, C Kamath, K Klein, K Pietrzak
Annual International Cryptology Conference, 370-399, 2022
92022
A Closer Look at Multiple Forking: Leveraging (In)Dependence for a Tighter Bound
S Chatterjee, C Kamath
Algorithmica 74, 1321-1362, 2016
82016
Limits on the adaptive security of yao’s garbling
C Kamath, K Klein, K Pietrzak, D Wichs
Annual International Cryptology Conference, 486-515, 2021
52021
Batch proofs are statistically hiding
N Bitansky, C Kamath, O Paneth, R Rothblum, PN Vasudevan
Cryptology ePrint Archive, 2023
42023
On treewidth, separators and yao’s garbling
C Kamath, K Klein, K Pietrzak
Theory of Cryptography Conference, 486-517, 2021
42021
On Average-Case Hardness in from One-Way Functions
P Hubáček, C Kamath, K Král, V Slívová
Theory of Cryptography Conference, 614-638, 2020
42020
Adaptively secure proxy re-encryption
G Fuchsbauer, C Kamath, K Klein, K Pietrzak
Cryptology ePrint Archive, 2018
42018
The cost of adaptivity in security games on graphs
C Kamath, K Klein, K Pietrzak, M Walter
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021
3*2021
(Verifiable) Delay Functions from Lucas Sequences
C Hoffmann, P Hubáček, C Kamath, T Krňák
Theory of Cryptography Conference, 336-362, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20