Hemanta K. Maji, Ph.D.

Affiliations: 
2011 Computer Science University of Illinois, Urbana-Champaign, Urbana-Champaign, IL 
Area:
Computer Science
Google:
"Hemanta Maji"

Parents

Sign in to add mentor
Manoj Prabhakaran grad student 2011 UIUC
 (On computational intractability assumptions in cryptography.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Maji HK. (2020) Computational Hardness of Collective Coin-Tossing Protocols. Entropy (Basel, Switzerland). 23
Khurana D, Kraschewski D, Maji HK, et al. (2016) All complete functionalities are reversible Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9666: 213-242
Gupta D, Ishai Y, Maji HK, et al. (2015) Secure computation from leaky correlated randomness Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9216: 701-720
Mahmoody M, Maji HK, Prabhakaran M. (2014) Limits of random oracles in secure computation Itcs 2014 - Proceedings of the 2014 Conference On Innovations in Theoretical Computer Science. 23-33
Kraschewski D, Maji HK, Prabhakaran M, et al. (2014) A full characterization of completeness for two-party randomized function evaluation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8441: 659-676
Mahmoody M, Maji HK, Prabhakaran M. (2014) On the power of public-key encryption in secure computation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8349: 240-264
Khurana D, Maji HK, Sahai A. (2014) Black-box separations for differentially private protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8874: 386-405
Maji HK, Prabhakaran M, Rosulek M. (2013) Complexity of multi-party computation functionalities Cryptology and Information Security Series. 10: 249-283
Maji HK, Prabhakaran M, Rosulek M. (2012) A unified characterization of completeness and triviality for secure function evaluation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7668: 40-59
Goyal V, Maji HK. (2011) Stateless cryptographic protocols Proceedings - Annual Ieee Symposium On Foundations of Computer Science, Focs. 678-687
See more...