Author of the publication

On Black-Box Constructions of Time and Space Efficient Sublinear Arguments from Symmetric-Key Primitives.

, , , and . TCC (1), volume 13747 of Lecture Notes in Computer Science, page 417-446. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Venkitasubramaniam, Muthuramakrishnan
add a person with the name Venkitasubramaniam, Muthuramakrishnan
 

Other publications of authors with the same name

Brief announcement: on the round complexity of distributed consensus over synchronous networks., , , , and . PODC, page 397. ACM, (2004)Which Languages Have 4-Round Fully Black-Box Zero-Knowledge Arguments from One-Way Functions?, , and . EUROCRYPT (3), volume 12107 of Lecture Notes in Computer Science, page 599-619. Springer, (2020)Can Alice and Bob Guarantee Output to Carol?, , and . EUROCRYPT (5), volume 14655 of Lecture Notes in Computer Science, page 32-61. Springer, (2024)Composable Adaptive Secure Protocols Without Setup Under Polytime Assumptions., and . TCC (B1), volume 9985 of Lecture Notes in Computer Science, page 400-432. (2016)Flag: A Framework for Lightweight Robust Secure Aggregation., , , and . AsiaCCS, page 14-28. ACM, (2023)What Security Can We Achieve Within 4 Rounds?, and . SCN, volume 9841 of Lecture Notes in Computer Science, page 486-505. Springer, (2016)On Adaptively Secure Protocols.. SCN, volume 8642 of Lecture Notes in Computer Science, page 455-475. Springer, (2014)Your Reputation's Safe with Me: Framing-Free Distributed Zero-Knowledge Proofs., , and . TCC (1), volume 14369 of Lecture Notes in Computer Science, page 34-64. Springer, (2023)Going Beyond Dual Execution: MPC for Functions with Efficient Verification., , and . Public Key Cryptography (2), volume 12111 of Lecture Notes in Computer Science, page 328-356. Springer, (2020)Better Two-Round Adaptive Multi-party Computation., , and . Public Key Cryptography (2), volume 10175 of Lecture Notes in Computer Science, page 396-427. Springer, (2017)