Hemanta K. Maji, Ph.D.
Affiliations: | 2011 | Computer Science | University of Illinois, Urbana-Champaign, Urbana-Champaign, IL |
Area:
Computer ScienceGoogle:
"Hemanta Maji"Parents
Sign in to add mentorManoj Prabhakaran | grad student | 2011 | UIUC | |
(On computational intractability assumptions in cryptography.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Maji HK. (2020) Computational Hardness of Collective Coin-Tossing Protocols. Entropy (Basel, Switzerland). 23 |
Khurana D, Kraschewski D, Maji HK, et al. (2016) All complete functionalities are reversible Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9666: 213-242 |
Gupta D, Ishai Y, Maji HK, et al. (2015) Secure computation from leaky correlated randomness Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9216: 701-720 |
Mahmoody M, Maji HK, Prabhakaran M. (2014) Limits of random oracles in secure computation Itcs 2014 - Proceedings of the 2014 Conference On Innovations in Theoretical Computer Science. 23-33 |
Kraschewski D, Maji HK, Prabhakaran M, et al. (2014) A full characterization of completeness for two-party randomized function evaluation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8441: 659-676 |
Mahmoody M, Maji HK, Prabhakaran M. (2014) On the power of public-key encryption in secure computation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8349: 240-264 |
Khurana D, Maji HK, Sahai A. (2014) Black-box separations for differentially private protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8874: 386-405 |
Maji HK, Prabhakaran M, Rosulek M. (2013) Complexity of multi-party computation functionalities Cryptology and Information Security Series. 10: 249-283 |
Maji HK, Prabhakaran M, Rosulek M. (2012) A unified characterization of completeness and triviality for secure function evaluation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7668: 40-59 |
Goyal V, Maji HK. (2011) Stateless cryptographic protocols Proceedings - Annual Ieee Symposium On Foundations of Computer Science, Focs. 678-687 |