Author of the publication

Hardware Acceleration of Searchable Encryption.

, , , and . ACM Conference on Computer and Communications Security, page 2201-2203. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Patranabis, Sikhar
add a person with the name Patranabis, Sikhar
 

Other publications of authors with the same name

Cryptographically Secure Multi-tenant Provisioning of FPGAs., , , and . SPACE, volume 12586 of Lecture Notes in Computer Science, page 208-225. Springer, (2020)Statistical Security in Two-Party Computation Revisited., , and . TCC (2), volume 13748 of Lecture Notes in Computer Science, page 181-210. Springer, (2022)Fully-Secure MPC with Minimal Trust., , , , and . TCC (2), volume 13748 of Lecture Notes in Computer Science, page 470-501. Springer, (2022)BETA: Biometric Enabled Threshold Authentication., , , , and . IACR Cryptol. ePrint Arch., (2020)Threshold OPRF from Threshold Additive HE., , and . IACR Cryptol. ePrint Arch., (2024)Compact Key Function Secret Sharing with Non-linear Decoder., , and . IACR Cryptol. ePrint Arch., (2024)GAPP: Generic Aggregation of Polynomial Protocols., , , and . IACR Cryptol. ePrint Arch., (2024)POSTER: Authenticated Key-Exchange Protocol for Heterogeneous CPS., , , and . AsiaCCS, page 849-851. ACM, (2018)Using Tweaks to Design Fault Resistant Ciphers., , and . VLSID, page 585-586. IEEE Computer Society, (2016)ALAFA: Automatic Leakage Assessment for Fault Attack Countermeasures., , , , and . DAC, page 136. ACM, (2019)