default search action
Vipul Goyal
Person information
- affiliation: Carnegie Mellon University
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c123]Vipul Goyal, Chen-Da Liu-Zhang, Yifan Song:
Towards Achieving Asynchronous MPC with Linear Communication and Optimal Resilience. CRYPTO (8) 2024: 170-206 - [c122]James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta, Justin Raizes, Bhaskar Roberts:
Software with Certified Deletion. EUROCRYPT (4) 2024: 85-111 - [c121]Prabhanjan Ananth, Gilad Asharov, Vipul Goyal, Hadar Kaner, Pratik Soni, Brent Waters:
NIZKs with Maliciously Chosen CRS: Subversion Advice-ZK and Accountable Soundness. SCN (1) 2024: 3-23 - [c120]Naresh Goud Boddu, Vipul Goyal, Rahul Jain, João Ribeiro:
Split-State Non-malleable Codes and Secret Sharing Schemes for Quantum Messages. TCC (2) 2024: 60-93 - [c119]Alper Çakan, Vipul Goyal, Chen-Da Liu-Zhang, João Ribeiro:
Unbounded Leakage-Resilience and Intrusion-Detection in a Quantum World. TCC (2) 2024: 159-191 - [c118]Vipul Goyal, Giulio Malavolta, Justin Raizes:
Unclonable Commitments and Proofs. TCC (3) 2024: 193-224 - [c117]Alper Çakan, Vipul Goyal:
Unclonable Cryptography with Unbounded Collusions and Impossibility of Hyperefficient Shadow Tomography. TCC (3) 2024: 225-256 - [i119]Prabhanjan Ananth, Vipul Goyal, Jiahui Liu, Qipeng Liu:
Unclonable Secret Sharing. CoRR abs/2406.11008 (2024) - [i118]Prabhanjan Ananth, Gilad Asharov, Vipul Goyal, Hadar Kaner, Pratik Soni, Brent Waters:
NIZKs with Maliciously Chosen CRS: Subversion Advice-ZK and Accountable Soundness. IACR Cryptol. ePrint Arch. 2024: 207 (2024) - [i117]Vipul Goyal, Chen-Da Liu-Zhang, Yifan Song:
Towards Achieving Asynchronous MPC with Linear Communication and Optimal Resilience. IACR Cryptol. ePrint Arch. 2024: 243 (2024) - [i116]Naresh Goud Boddu, Vipul Goyal, Rahul Jain, João Ribeiro:
Split-State Non-Malleable Codes and Secret Sharing Schemes for Quantum Messages. IACR Cryptol. ePrint Arch. 2024: 335 (2024) - [i115]Prabhanjan Ananth, Vipul Goyal, Jiahui Liu, Qipeng Liu:
Unclonable Secret Sharing. IACR Cryptol. ePrint Arch. 2024: 716 (2024) - [i114]Vipul Goyal, Junru Li, Ankit Kumar Misra, Rafail Ostrovsky, Yifan Song, Chenkai Weng:
Dishonest Majority Constant-Round MPC with Linear Communication from DDH. IACR Cryptol. ePrint Arch. 2024: 1466 (2024) - [i113]Alper Çakan, Vipul Goyal, Takashi Yamakawa:
Anonymous Public-Key Quantum Money and Quantum Voting. IACR Cryptol. ePrint Arch. 2024: 1822 (2024) - [i112]Alper Çakan, Vipul Goyal, Justin Raizes:
How to Delete Without a Trace: Certified Deniability in a Quantum World. IACR Cryptol. ePrint Arch. 2024: 1832 (2024) - [i111]Alper Çakan, Vipul Goyal:
Unbounded Leakage-Resilient Encryption and Signatures. IACR Cryptol. ePrint Arch. 2024: 1876 (2024) - 2023
- [c116]Vipul Goyal, Chen-Da Liu-Zhang, Rafail Ostrovsky:
Asymmetric Multi-Party Computation. ITC 2023: 6:1-6:25 - [c115]Vipul Goyal, Xiao Liang, Giulio Malavolta:
On Concurrent Multi-party Quantum Computation. CRYPTO (5) 2023: 129-161 - [c114]Vipul Goyal, Akshayaram Srinivasan, Mingyuan Wang:
Reusable Secure Computation in the Plain Model. CRYPTO (1) 2023: 427-458 - [c113]Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song, Chenkai Weng:
SuperPack: Dishonest Majority MPC with Constant Online Communication. EUROCRYPT (2) 2023: 220-250 - [c112]Vipul Goyal, Chen-Da Liu-Zhang, Justin Raizes, João Ribeiro:
Asynchronous Multi-Party Quantum Computation. ITCS 2023: 62:1-62:22 - [c111]Alper Çakan, Vipul Goyal, Chen-Da Liu-Zhang, João Ribeiro:
Computational Quantum Secret Sharing. TQC 2023: 4:1-4:26 - [i110]Alper Çakan, Vipul Goyal, Chen-Da Liu-Zhang, João Ribeiro:
Computational Quantum Secret Sharing. CoRR abs/2305.00356 (2023) - [i109]Naresh Goud Boddu, Vipul Goyal, Rahul Jain, João Ribeiro:
Split-State Non-Malleable Codes and Secret Sharing Schemes for Quantum Messages. CoRR abs/2308.06466 (2023) - [i108]Orestis Chardouvelis, Vipul Goyal, Aayush Jain, Jiahui Liu:
Quantum Key Leasing for PKE and FHE with a Classical Lessor. CoRR abs/2310.14328 (2023) - [i107]Alper Çakan, Vipul Goyal:
Unclonable Cryptography with Unbounded Collusions. CoRR abs/2311.18318 (2023) - [i106]James Bartusek, Sanjam Garg, Vipul Goyal, Dakshita Khurana, Giulio Malavolta, Justin Raizes, Bhaskar Roberts:
Obfuscation and Outsourced Computation with Certified Deletion. IACR Cryptol. ePrint Arch. 2023: 265 (2023) - [i105]Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song, Chenkai Weng:
SUPERPACK: Dishonest Majority MPC with Constant Online Communication. IACR Cryptol. ePrint Arch. 2023: 307 (2023) - [i104]Alper Çakan, Vipul Goyal, Chen-Da Liu-Zhang, João Ribeiro:
Unbounded Leakage-Resilience and Leakage-Detection in a Quantum World. IACR Cryptol. ePrint Arch. 2023: 410 (2023) - [i103]Alper Çakan, Vipul Goyal, Chen-Da Liu-Zhang, João Ribeiro:
Computational Quantum Secret Sharing. IACR Cryptol. ePrint Arch. 2023: 613 (2023) - [i102]Vipul Goyal, Chen-Da Liu-Zhang, Rafail Ostrovsky:
Asymmetric Multi-Party Computation. IACR Cryptol. ePrint Arch. 2023: 704 (2023) - [i101]Vipul Goyal, Xiao Liang, Giulio Malavolta:
On Concurrent Multi-Party Quantum Computation. IACR Cryptol. ePrint Arch. 2023: 827 (2023) - [i100]Vipul Goyal, Akshayaram Srinivasan, Mingyuan Wang:
Reusable Secure Computation in the Plain Model. IACR Cryptol. ePrint Arch. 2023: 1006 (2023) - [i99]Vipul Goyal, Giulio Malavolta, Justin Raizes:
Unclonable Commitments and Proofs. IACR Cryptol. ePrint Arch. 2023: 1538 (2023) - [i98]Orestis Chardouvelis, Vipul Goyal, Aayush Jain, Jiahui Liu:
Quantum Key Leasing for PKE and FHE with a Classical Lessor. IACR Cryptol. ePrint Arch. 2023: 1640 (2023) - [i97]Alper Çakan, Vipul Goyal:
Unclonable Cryptography with Unbounded Collusions. IACR Cryptol. ePrint Arch. 2023: 1841 (2023) - 2022
- [c110]Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song:
TurboPack: Honest Majority MPC with Constant Online Communication. CCS 2022: 951-964 - [c109]Vipul Goyal, Antigoni Polychroniadou, Yifan Song:
Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing. CRYPTO (4) 2022: 3-32 - [c108]Vipul Goyal, Yuval Ishai, Yifan Song:
Tight Bounds on the Randomness Complexity of Secure Multiparty Computation. CRYPTO (4) 2022: 483-513 - [c107]Diana Ghinea, Vipul Goyal, Chen-Da Liu-Zhang:
Round-Optimal Byzantine Agreement. EUROCRYPT (1) 2022: 96-119 - [c106]Vipul Goyal, Yuval Ishai, Yifan Song:
Private Circuits with Quasilinear Randomness. EUROCRYPT (3) 2022: 192-221 - [c105]Nico Döttling, Vipul Goyal, Giulio Malavolta, Justin Raizes:
Interaction-Preserving Compilers for Secure Computation. ITCS 2022: 57:1-57:18 - [c104]Vipul Goyal, Justin Raizes, Pratik Soni:
Time-Traveling Simulators Using Blockchains and Their Applications. ITCS 2022: 81:1-81:19 - [c103]Vipul Goyal, Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno, Yifan Song:
Storing and Retrieving Secrets on a Blockchain. Public Key Cryptography (1) 2022: 252-282 - [c102]Behzad Abdolmaleki, Nils Fleischhacker, Vipul Goyal, Abhishek Jain, Giulio Malavolta:
Steganography-Free Zero-Knowledge. TCC (1) 2022: 143-172 - [i96]Vipul Goyal, Justin Raizes, Pratik Soni:
Time-Traveling Simulators Using Blockchains and Their Applications. IACR Cryptol. ePrint Arch. 2022: 35 (2022) - [i95]Vipul Goyal, Yuval Ishai, Yifan Song:
Private Circuits with Quasilinear Randomness. IACR Cryptol. ePrint Arch. 2022: 250 (2022) - [i94]Diana Ghinea, Vipul Goyal, Chen-Da Liu-Zhang:
Round-Optimal Byzantine Agreement. IACR Cryptol. ePrint Arch. 2022: 255 (2022) - [i93]Elisaweta Masserova, Deepali Garg, Ken Mai, Lawrence T. Pileggi, Vipul Goyal, Bryan Parno:
Logic Locking - Connecting Theory and Practice. IACR Cryptol. ePrint Arch. 2022: 545 (2022) - [i92]Vipul Goyal, Yuval Ishai, Yifan Song:
Tight Bounds on the Randomness Complexity of Secure Multiparty Computation. IACR Cryptol. ePrint Arch. 2022: 799 (2022) - [i91]Vipul Goyal, Antigoni Polychroniadou, Yifan Song:
Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing. IACR Cryptol. ePrint Arch. 2022: 831 (2022) - [i90]Behzad Abdolmaleki, Nils Fleischhacker, Vipul Goyal, Abhishek Jain, Giulio Malavolta:
Steganography-Free Zero-Knowledge. IACR Cryptol. ePrint Arch. 2022: 1263 (2022) - [i89]Daniel Escudero, Vipul Goyal, Antigoni Polychroniadou, Yifan Song:
TurboPack: Honest Majority MPC with Constant Online Communication. IACR Cryptol. ePrint Arch. 2022: 1316 (2022) - [i88]Vipul Goyal, Chen-Da Liu-Zhang, Justin Raizes, João Ribeiro:
Asynchronous Multi-Party Quantum Computation. IACR Cryptol. ePrint Arch. 2022: 1583 (2022) - 2021
- [j5]Vipul Goyal, Silas Richelson, Alon Rosen, Margarita Vald:
An Algebraic Approach to Nonmalleability. SIAM J. Comput. 50(5): 1537-1579 (2021) - [c101]Xiaoqi Duan, Vipul Goyal, Hanjun Li, Rafail Ostrovsky, Antigoni Polychroniadou, Yifan Song:
ACCO: Algebraic Computation with Comparison. CCSW 2021: 21-38 - [c100]Vipul Goyal, Hanjun Li, Rafail Ostrovsky, Antigoni Polychroniadou, Yifan Song:
ATLAS: Efficient and Scalable MPC in the Honest Majority Setting. CRYPTO (2) 2021: 244-274 - [c99]Vipul Goyal, Antigoni Polychroniadou, Yifan Song:
Unconditional Communication-Efficient MPC via Hall's Marriage Theorem. CRYPTO (2) 2021: 275-304 - [c98]Vipul Goyal, Yifan Song, Akshayaram Srinivasan:
Traceable Secret Sharing and Applications. CRYPTO (3) 2021: 718-747 - [c97]Michele Ciampi, Vipul Goyal, Rafail Ostrovsky:
Threshold Garbled Circuits and Ad Hoc Secure Computation. EUROCRYPT (3) 2021: 64-93 - [c96]Prabhanjan Ananth, Gilad Asharov, Hila Dahari, Vipul Goyal:
Towards Accountability in CRS Generation. EUROCRYPT (3) 2021: 278-308 - [c95]Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta:
Post-Quantum Multi-Party Computation. EUROCRYPT (1) 2021: 435-464 - [c94]Vipul Goyal, Akshayaram Srinivasan, Chenzhi Zhu:
Multi-source Non-malleable Extractors and Applications. EUROCRYPT (2) 2021: 468-497 - [c93]Florian Breuer, Vipul Goyal, Giulio Malavolta:
Cryptocurrencies with Security Policies and Two-Factor Authentication. EuroS&P 2021: 140-158 - [c92]Vipul Goyal, Hanjun Li, Justin Raizes:
Instant Block Confirmation in the Sleepy Model. Financial Cryptography (2) 2021: 65-83 - [c91]Vipul Goyal, Elisaweta Masserova, Bryan Parno, Yifan Song:
Blockchains Enable Non-interactive MPC. TCC (2) 2021: 162-193 - [c90]Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky:
Oblivious Transfer from Trapdoor Permutations in Minimal Rounds. TCC (2) 2021: 518-549 - [c89]Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta:
Two-Round Maliciously Secure Computation with Super-Polynomial Simulation. TCC (1) 2021: 654-685 - [i87]Michele Ciampi, Vipul Goyal, Rafail Ostrovsky:
Threshold Garbled Circuits and Ad Hoc Secure Computation. IACR Cryptol. ePrint Arch. 2021: 308 (2021) - [i86]Florian Breuer, Vipul Goyal, Giulio Malavolta:
Cryptocurrencies with Security Policies and Two-Factor Authentication. IACR Cryptol. ePrint Arch. 2021: 416 (2021) - [i85]Vipul Goyal, Hanjun Li, Rafail Ostrovsky, Antigoni Polychroniadou, Yifan Song:
ATLAS: Efficient and Scalable MPC in the Honest Majority Setting. IACR Cryptol. ePrint Arch. 2021: 833 (2021) - [i84]Vipul Goyal, Antigoni Polychroniadou, Yifan Song:
Unconditional Communication-Efficient MPC via Hall's Marriage Theorem. IACR Cryptol. ePrint Arch. 2021: 834 (2021) - [i83]Vipul Goyal, Yifan Song, Akshayaram Srinivasan:
Traceable Secret Sharing and Applications. IACR Cryptol. ePrint Arch. 2021: 871 (2021) - [i82]Prabhanjan Ananth, Gilad Asharov, Hila Dahari, Vipul Goyal:
Towards Accountability in CRS Generation. IACR Cryptol. ePrint Arch. 2021: 1090 (2021) - [i81]Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta:
Two-Round Maliciously Secure Computation with Super-Polynomial Simulation. IACR Cryptol. ePrint Arch. 2021: 1230 (2021) - [i80]Vipul Goyal, Elisaweta Masserova, Bryan Parno, Yifan Song:
Blockchains Enable Non-Interactive MPC. IACR Cryptol. ePrint Arch. 2021: 1233 (2021) - [i79]Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky:
Oblivious Transfer from Trapdoor Permutations in Minimal Rounds. IACR Cryptol. ePrint Arch. 2021: 1433 (2021) - [i78]Nico Döttling, Vipul Goyal, Giulio Malavolta, Justin Raizes:
Interaction-Preserving Compilers for Secure Computation. IACR Cryptol. ePrint Arch. 2021: 1503 (2021) - 2020
- [j4]Eshan Chattopadhyay, Vipul Goyal, Xin Li:
Nonmalleable Extractors and Codes, with Their Many Tampered Extensions. SIAM J. Comput. 49(5): 999-1040 (2020) - [c88]Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas E. Anderson, Arvind Krishnamurthy, Bryan Parno:
Talek: Private Group Messaging with Hidden Access Patterns. ACSAC 2020: 84-99 - [c87]Vipul Goyal, Yifan Song, Chenzhi Zhu:
Guaranteed Output Delivery Comes Free in Honest Majority MPC. CRYPTO (2) 2020: 618-646 - [c86]Vipul Goyal, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta:
Statistical Zaps and New Oblivious Transfer Protocols. EUROCRYPT (3) 2020: 668-699 - [c85]Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Ashutosh Kumar, Xin Li, Raghu Meka, David Zuckerman:
Extractors and Secret Sharing Against Bounded Collusion Protocols. FOCS 2020: 1226-1242 - [c84]Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain:
The Round Complexity of Secure Computation Against Covert Adversaries. SCN 2020: 600-620 - [c83]Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li:
Extractors for adversarial sources via extremal hypergraphs. STOC 2020: 1184-1197 - [c82]Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky:
Round Optimal Secure Multiparty Computation from Minimal Assumptions. TCC (2) 2020: 291-319 - [i77]Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas E. Anderson, Arvind Krishnamurthy, Bryan Parno:
Talek: Private Group Messaging with Hidden Access Patterns. CoRR abs/2001.08250 (2020) - [i76]Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta:
Post-Quantum Multi-Party Computation in Constant Rounds. CoRR abs/2005.12904 (2020) - [i75]Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li:
Leakage-Resilient Extractors and Secret-Sharing against Bounded Collusion Protocols. Electron. Colloquium Comput. Complex. TR20 (2020) - [i74]Raymond Cheng, William Scott, Elisaweta Masserova, Irene Zhang, Vipul Goyal, Thomas E. Anderson, Arvind Krishnamurthy, Bryan Parno:
Talek: Private Group Messaging with Hidden Access Patterns. IACR Cryptol. ePrint Arch. 2020: 66 (2020) - [i73]Vipul Goyal, Yifan Song:
Malicious Security Comes Free in Honest-Majority MPC. IACR Cryptol. ePrint Arch. 2020: 134 (2020) - [i72]Vipul Goyal, Akshayaram Srinivasan, Chenzhi Zhu:
Multi-Source Non-Malleable Extractors and Applications. IACR Cryptol. ePrint Arch. 2020: 157 (2020) - [i71]Vipul Goyal, Yifan Song, Chenzhi Zhu:
Guaranteed Output Delivery Comes Free in Honest Majority MPC. IACR Cryptol. ePrint Arch. 2020: 189 (2020) - [i70]Vipul Goyal, Abhishek Jain, Zhengzhong Jin, Giulio Malavolta:
Statistical Zaps and New Oblivious Transfer Protocols. IACR Cryptol. ePrint Arch. 2020: 235 (2020) - [i69]Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li:
Leakage-Resilient Extractors and Secret-Sharing against Bounded Collusion Protocols. IACR Cryptol. ePrint Arch. 2020: 478 (2020) - [i68]Vipul Goyal, Abhiram Kothapalli, Elisaweta Masserova, Bryan Parno, Yifan Song:
Storing and Retrieving Secrets on a Blockchain. IACR Cryptol. ePrint Arch. 2020: 504 (2020) - [i67]Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain:
The Round Complexity of Secure Computation Against Covert Adversaries. IACR Cryptol. ePrint Arch. 2020: 1092 (2020) - [i66]Amit Agarwal, James Bartusek, Vipul Goyal, Dakshita Khurana, Giulio Malavolta:
Post-Quantum Multi-Party Computation. IACR Cryptol. ePrint Arch. 2020: 1395 (2020)
2010 – 2019
- 2019
- [c81]Vipul Goyal, Yanyi Liu, Yifan Song:
Communication-Efficient Unconditional MPC with Guaranteed Output Delivery. CRYPTO (2) 2019: 85-114 - [c80]Vipul Goyal, Aayush Jain, Amit Sahai:
Simultaneous Amplification: The Case of Non-interactive Zero-Knowledge. CRYPTO (2) 2019: 608-637 - [c79]Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain:
Founding Secure Computation on Blockchains. EUROCRYPT (2) 2019: 351-380 - [c78]Vipul Goyal, Yifan Song:
Correlated-Source Extractors and Cryptography with Correlated-Random Tapes. EUROCRYPT (1) 2019: 562-592 - [c77]Nico Döttling, Sanjam Garg, Vipul Goyal, Giulio Malavolta:
Laconic Conditional Disclosure of Secrets and Applications. FOCS 2019: 661-685 - [c76]Vipul Goyal, Silas Richelson:
Non-Malleable Commitments using Goldreich-Levin List Decoding. FOCS 2019: 686-699 - [c75]Nils Fleischhacker, Vipul Goyal, Abhishek Jain, Anat Paskin-Cherniavsky, Slava Radune:
Interactive Non-malleable Codes. TCC (2) 2019: 233-263 - [i65]Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li:
Extractors for Adversarial Sources via Extremal Hypergraphs. Electron. Colloquium Comput. Complex. TR19 (2019) - [i64]Arka Rai Choudhuri, Michele Ciampi, Vipul Goyal, Abhishek Jain, Rafail Ostrovsky:
On Round Optimal Secure Multiparty Computation from Minimal Assumptions. IACR Cryptol. ePrint Arch. 2019: 216 (2019) - [i63]Vipul Goyal, Yifan Song:
Correlated-Source Extractors and Cryptography with Correlated-Random Tapes. IACR Cryptol. ePrint Arch. 2019: 240 (2019) - [i62]Arka Rai Choudhuri, Vipul Goyal, Abhishek Jain:
Founding Secure Computation on Blockchains. IACR Cryptol. ePrint Arch. 2019: 253 (2019) - [i61]Vipul Goyal, Aayush Jain, Amit Sahai:
Simultaneous Amplification: The Case of Non-Interactive Zero-Knowledge. IACR Cryptol. ePrint Arch. 2019: 626 (2019) - [i60]Vipul Goyal, Yanyi Liu, Yifan Song:
Communication-Efficient Unconditional MPC with Guaranteed Output Delivery. IACR Cryptol. ePrint Arch. 2019: 646 (2019) - [i59]Vipul Goyal, Silas Richelson:
Non-Malleable Commitments Using Goldreich-Levin List Decoding. IACR Cryptol. ePrint Arch. 2019: 1195 (2019) - [i58]Nico Döttling, Sanjam Garg, Vipul Goyal, Giulio Malavolta:
Laconic Conditional Disclosure of Secrets and Applications. IACR Cryptol. ePrint Arch. 2019: 1353 (2019) - [i57]Eshan Chattopadhyay, Jesse Goodman, Vipul Goyal, Xin Li:
Extractors for Adversarial Sources via Extremal Hypergraphs. IACR Cryptol. ePrint Arch. 2019: 1450 (2019) - 2018
- [c74]Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai:
Promise Zero Knowledge and Its Applications to Round Optimal MPC. CRYPTO (2) 2018: 459-487 - [c73]Vipul Goyal, Ashutosh Kumar:
Non-malleable Secret Sharing for General Access Structures. CRYPTO (1) 2018: 501-530 - [c72]Nils Fleischhacker, Vipul Goyal, Abhishek Jain:
On the Existence of Three Round Zero-Knowledge Proofs. EUROCRYPT (3) 2018: 3-33 - [c71]Deepak Kumar Sharma, Sumit Vohra, Tarun Gupta, Vipul Goyal:
Predicting the Algorithmic Time Complexity of Single Parametric Algorithms Using Multiclass Classification with Gradient Boosted Trees. IC3 2018: 1-6 - [c70]Vipul Goyal, Ashutosh Kumar:
Non-malleable secret sharing. STOC 2018: 685-698 - [i56]Nils Fleischhacker, Vipul Goyal, Abhishek Jain:
On the Existence of Three Round Zero-Knowledge Proofs. IACR Cryptol. ePrint Arch. 2018: 167 (2018) - [i55]Vipul Goyal, Ashutosh Kumar:
Non-Malleable Secret Sharing. IACR Cryptol. ePrint Arch. 2018: 316 (2018) - [i54]Vipul Goyal, Ashutosh Kumar:
Non-Malleable Secret Sharing for General Access Structures. IACR Cryptol. ePrint Arch. 2018: 750 (2018) - 2017
- [c69]Zvika Brakerski, Nishanth Chandran, Vipul Goyal, Aayush Jain, Amit Sahai, Gil Segev:
Hierarchical Functional Encryption. ITCS 2017: 8:1-8:27 - [c68]Kartik Nayak, Christopher W. Fletcher, Ling Ren, Nishanth Chandran, Satya V. Lokam, Elaine Shi, Vipul Goyal:
HOP: Hardware makes Obfuscation Practical. NDSS 2017 - [c67]Rishab Goyal, Vipul Goyal:
Overcoming Cryptographic Impossibility Results Using Blockchains. TCC (1) 2017: 529-561 - [c66]Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Dakshita Khurana, Amit Sahai:
Round Optimal Concurrent MPC via Strong Simulation. TCC (1) 2017: 743-775 - [i53]Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai:
A note on VRFs from Verifiable Functional Encryption. IACR Cryptol. ePrint Arch. 2017: 51 (2017) - [i52]Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Dakshita Khurana, Amit Sahai:
Round Optimal Concurrent MPC via Strong Simulation. IACR Cryptol. ePrint Arch. 2017: 597 (2017) - [i51]Rishab Goyal, Vipul Goyal:
Overcoming Cryptographic Impossibility Results using Blockchains. IACR Cryptol. ePrint Arch. 2017: 935 (2017) - [i50]Saikrishna Badrinarayanan, Vipul Goyal, Abhishek Jain, Yael Tauman Kalai, Dakshita Khurana, Amit Sahai:
Promise Zero Knowledge and its Applications to Round Optimal MPC. IACR Cryptol. ePrint Arch. 2017: 1088 (2017) - 2016
- [c65]Vipul Goyal, Aayush Jain, Adam O'Neill:
Multi-input Functional Encryption with Unbounded-Message Security. ASIACRYPT (2) 2016: 531-556 - [c64]Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai:
Verifiable Functional Encryption. ASIACRYPT (2) 2016: 557-587 - [c63]Vipul Goyal, Yuval Ishai, Hemanta K. Maji, Amit Sahai, Alexander A. Sherstov:
Bounded-Communication Leakage Resilience via Parity-Resilient Circuits. FOCS 2016: 1-10 - [c62]Vipul Goyal, Dakshita Khurana, Amit Sahai:
Breaking the Three Round Barrier for Non-malleable Commitments. FOCS 2016: 21-30 - [c61]Vipul Goyal, Dakshita Khurana, Ilya Mironov, Omkant Pandey, Amit Sahai:
Do Distributed Differentially-Private Protocols Require Oblivious Transfer?. ICALP 2016: 29:1-29:15 - [c60]Nishanth Chandran, Vipul Goyal, Pratyay Mukherjee, Omkant Pandey, Jalaj Upadhyay:
Block-Wise Non-Malleable Codes. ICALP 2016: 31:1-31:14 - [c59]Eshan Chattopadhyay, Vipul Goyal, Xin Li:
Non-malleable extractors and codes, with their many tampered extensions. STOC 2016: 285-298 - [c58]Vipul Goyal, Omkant Pandey, Silas Richelson:
Textbook non-malleable commitments. STOC 2016: 1128-1141 - [i49]Eshan Chattopadhyay, Vipul Goyal, Xin Li:
Non-Malleable Extractors and Codes, with their Many Tampered Extensions. IACR Cryptol. ePrint Arch. 2016: 340 (2016) - [i48]Saikrishna Badrinarayanan, Vipul Goyal, Aayush Jain, Amit Sahai:
Verifiable Functional Encryption. IACR Cryptol. ePrint Arch. 2016: 629 (2016) - 2015
- [c57]Hai Brenner, Vipul Goyal, Silas Richelson, Alon Rosen, Margarita Vald:
Fast Non-Malleable Commitments. CCS 2015: 1048-1057 - [c56]Vipul Goyal, Divya Gupta, Amit Sahai:
Concurrent Secure Computation via Non-Black Box Simulation. CRYPTO (2) 2015: 23-42 - [c55]Ran Canetti, Vipul Goyal, Abhishek Jain:
Concurrent Secure Computation with Optimal Query Complexity. CRYPTO (2) 2015: 43-62 - [c54]Vipul Goyal, Huijia Lin, Omkant Pandey, Rafael Pass, Amit Sahai:
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma. TCC (1) 2015: 260-289 - [c53]Vipul Goyal, Abhishek Jain, Venkata Koppula, Amit Sahai:
Functional Encryption for Randomized Functionalities. TCC (2) 2015: 325-351 - [e1]Alex Biryukov, Vipul Goyal:
Progress in Cryptology - INDOCRYPT 2015 - 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings. Lecture Notes in Computer Science 9462, Springer 2015, ISBN 978-3-319-26616-9 [contents] - [i47]Eshan Chattopadhyay, Vipul Goyal, Xin Li:
Non-Malleable Extractors and Codes, with their Many Tampered Extensions. CoRR abs/1505.00107 (2015) - [i46]Eshan Chattopadhyay, Vipul Goyal, Xin Li:
Non-Malleable Extractors and Codes, with their Many Tampered Extensions. Electron. Colloquium Comput. Complex. TR15 (2015) - [i45]Nishanth Chandran, Vipul Goyal, Pratyay Mukherjee, Omkant Pandey, Jalaj Upadhyay:
Block-wise Non-Malleable Codes. IACR Cryptol. ePrint Arch. 2015: 129 (2015) - [i44]Vipul Goyal, Divya Gupta, Abhishek Jain:
What Information is Leaked under Concurrent Composition? IACR Cryptol. ePrint Arch. 2015: 420 (2015) - [i43]Vipul Goyal, Abhishek Jain:
On Concurrently Secure Computation in the Multiple Ideal Query Model. IACR Cryptol. ePrint Arch. 2015: 439 (2015) - [i42]Ran Canetti, Vipul Goyal, Abhishek Jain:
Concurrent Secure Computation with Optimal Query Complexity. IACR Cryptol. ePrint Arch. 2015: 559 (2015) - [i41]Nishanth Chandran, Vipul Goyal, Aayush Jain, Amit Sahai:
Functional Encryption: Decentralised and Delegatable. IACR Cryptol. ePrint Arch. 2015: 1017 (2015) - [i40]Vipul Goyal, Dakshita Khurana, Ilya Mironov, Omkant Pandey, Amit Sahai:
Do Distributed Differentially-Private Protocols Require Oblivious Transfer? IACR Cryptol. ePrint Arch. 2015: 1090 (2015) - [i39]Vipul Goyal, Aayush Jain, Dakshita Khurana:
Witness Signatures and Non-Malleable Multi-Prover Zero-Knowledge Proofs. IACR Cryptol. ePrint Arch. 2015: 1095 (2015) - [i38]Vipul Goyal, Divya Gupta, Amit Sahai:
Concurrent Secure Computation via Non-Black Box Simulation. IACR Cryptol. ePrint Arch. 2015: 1107 (2015) - [i37]Vipul Goyal, Aayush Jain, Adam O'Neill:
Multi-Input Functional Encryption with Unbounded-Message Security. IACR Cryptol. ePrint Arch. 2015: 1113 (2015) - [i36]Vipul Goyal, Omkant Pandey, Silas Richelson:
Textbook Non-Malleable Commitments. IACR Cryptol. ePrint Arch. 2015: 1178 (2015) - 2014
- [j3]Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner:
Position-Based Quantum Cryptography: Impossibility and Constructions. SIAM J. Comput. 43(1): 150-178 (2014) - [j2]Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky:
Position-Based Cryptography. SIAM J. Comput. 43(4): 1291-1341 (2014) - [c52]Prabhanjan Ananth, Vipul Goyal, Omkant Pandey:
Interactive Proofs under Continual Memory Leakage. CRYPTO (2) 2014: 164-182 - [c51]Shafi Goldwasser, S. Dov Gordon, Vipul Goyal, Abhishek Jain, Jonathan Katz, Feng-Hao Liu, Amit Sahai, Elaine Shi, Hong-Sheng Zhou:
Multi-input Functional Encryption. EUROCRYPT 2014: 578-602 - [c50]Vipul Goyal, Silas Richelson, Alon Rosen, Margarita Vald:
An Algebraic Approach to Non-malleability. FOCS 2014: 41-50 - [c49]Prabhanjan Ananth, Nishanth Chandran, Vipul Goyal, Bhavana Kanukurthi, Rafail Ostrovsky:
Achieving Privacy in Verifiable Computation with Multiple Servers - Without FHE and without Pre-processing. Public Key Cryptography 2014: 149-166 - [c48]Vipul Goyal, Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti:
Black-box non-black-box zero knowledge. STOC 2014: 515-524 - [c47]Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran, Alon Rosen:
Lower Bounds in the Hardware Token Model. TCC 2014: 663-687 - [i35]Vipul Goyal, Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti:
Black-Box Non-Black-Box Zero Knowledge. IACR Cryptol. ePrint Arch. 2014: 390 (2014) - [i34]Vipul Goyal, Silas Richelson, Alon Rosen, Margarita Vald:
An Algebraic Approach to Non-Malleability. IACR Cryptol. ePrint Arch. 2014: 586 (2014) - [i33]Prabhanjan Vijendra Ananth, Vipul Goyal, Omkant Pandey:
Interactive Proofs under Continual Memory Leakage. IACR Cryptol. ePrint Arch. 2014: 660 (2014) - 2013
- [c46]Vipul Goyal, Abhishek Jain, Rafail Ostrovsky, Silas Richelson, Ivan Visconti:
Constant-Round Concurrent Zero Knowledge in the Bounded Player Model. ASIACRYPT (1) 2013: 21-40 - [c45]Vipul Goyal, Divya Gupta, Abhishek Jain:
What Information Is Leaked under Concurrent Composition? CRYPTO (2) 2013: 220-238 - [c44]Vipul Goyal, Ilya Mironov, Omkant Pandey, Amit Sahai:
Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols. CRYPTO (1) 2013: 298-315 - [c43]Vipul Goyal, Abhishek Jain:
On Concurrently Secure Computation in the Multiple Ideal Query Model. EUROCRYPT 2013: 684-701 - [c42]Vipul Goyal:
Non-black-box simulation in the fully concurrent setting. STOC 2013: 221-230 - [c41]Vipul Goyal, Abhishek Jain, Rafail Ostrovsky, Silas Richelson, Ivan Visconti:
Concurrent Zero Knowledge in the Bounded Player Model. TCC 2013: 60-79 - [c40]Prabhanjan Ananth, Raghav Bhaskar, Vipul Goyal, Vanishree Rao:
On the (In)security of Fischlin's Paradigm. TCC 2013: 202-221 - [i32]Shafi Goldwasser, Vipul Goyal, Abhishek Jain, Amit Sahai:
Multi-Input Functional Encryption. IACR Cryptol. ePrint Arch. 2013: 727 (2013) - [i31]Vipul Goyal, Abhishek Jain, Venkata Koppula, Amit Sahai:
Functional Encryption for Randomized Functionalities. IACR Cryptol. ePrint Arch. 2013: 729 (2013) - [i30]Shashank Agrawal, Prabhanjan Ananth, Vipul Goyal, Manoj Prabhakaran, Alon Rosen:
Lower Bounds in the Hardware Token Model. IACR Cryptol. ePrint Arch. 2013: 827 (2013) - 2012
- [c39]Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai:
New Impossibility Results for Concurrent Composition and a Non-interactive Completeness Theorem for Secure Computation. CRYPTO 2012: 443-460 - [c38]Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai:
Concurrently Secure Computation in Constant Rounds. EUROCRYPT 2012: 99-116 - [c37]Vipul Goyal:
Positive Results for Concurrently Secure Computation in the Plain Model. FOCS 2012: 41-50 - [c36]Vipul Goyal, Chen-Kuei Lee, Rafail Ostrovsky, Ivan Visconti:
Constructing Non-malleable Commitments: A Black-Box Approach. FOCS 2012: 51-60 - [c35]Chaya Ganesh, Vipul Goyal, Satyanarayana V. Lokam:
On-Line/Off-Line Leakage Resilient Secure Computation Protocols. INDOCRYPT 2012: 100-119 - [c34]Vipul Goyal, Virendra Kumar, Satyanarayana V. Lokam, Mohammad Mahmoody:
On Black-Box Reductions between Predicate Encryption Schemes. TCC 2012: 440-457 - [i29]Alexandra Boldyreva, Vipul Goyal, Virendra Kumar:
Identity-based Encryption with Efficient Revocation. IACR Cryptol. ePrint Arch. 2012: 52 (2012) - [i28]Shweta Agrawal, Vipul Goyal, Abhishek Jain, Manoj Prabhakaran, Amit Sahai:
New Impossibility Results for Concurrent Composition and a Non-Interactive Completeness Theorem for Secure Computation. IACR Cryptol. ePrint Arch. 2012: 555 (2012) - [i27]Vipul Goyal, Omkant Pandey, Amit Sahai:
Round-Efficient Concurrently Composable Secure Computation via a Robust Extraction Lemma. IACR Cryptol. ePrint Arch. 2012: 652 (2012) - [i26]Prabhanjan Ananth, Raghav Bhaskar, Vipul Goyal, Vanishree Rao:
On the (In)security of Fischlin's Paradigm. IACR Cryptol. ePrint Arch. 2012: 721 (2012) - 2011
- [c33]Raghav Bhaskar, Abhishek Bhowmick, Vipul Goyal, Srivatsan Laxman, Abhradeep Thakurta:
Noiseless Database Privacy. ASIACRYPT 2011: 215-232 - [c32]Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, Amit Sahai, Moti Yung:
Resettable Cryptography in Constant Rounds - The Case of Zero Knowledge. ASIACRYPT 2011: 390-406 - [c31]Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner:
Position-Based Quantum Cryptography: Impossibility and Constructions. CRYPTO 2011: 429-446 - [c30]Vipul Goyal, Hemanta K. Maji:
Stateless Cryptographic Protocols. FOCS 2011: 678-687 - [c29]Vipul Goyal:
Secure Composition of Cryptographic Protocols. ICISS 2011: 71 - [c28]Vipul Goyal:
Secure Composition of Cryptographic Protocols. ProvSec 2011: 2 - [c27]Vipul Goyal:
Constant round non-malleable protocols using one way functions. STOC 2011: 695-704 - [c26]Vipul Goyal, Adam O'Neill, Vanishree Rao:
Correlated-Input Secure Hash Functions. TCC 2011: 182-200 - [c25]Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai:
Bringing People of Different Beliefs Together to Do UC. TCC 2011: 311-328 - [i25]Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal:
CompChall: Addressing Password Guessing Attacks. CoRR abs/1111.3753 (2011) - [i24]Vipul Goyal, Adam O'Neill, Vanishree Rao:
Correlated-Input Secure Hash Functions. IACR Cryptol. ePrint Arch. 2011: 233 (2011) - [i23]Sanjam Garg, Vipul Goyal, Abhishek Jain, Amit Sahai:
Concurrently Secure Computation in Constant Rounds. IACR Cryptol. ePrint Arch. 2011: 251 (2011) - [i22]Yi Deng, Dengguo Feng, Vipul Goyal, Dongdai Lin, Amit Sahai, Moti Yung:
Resettable Cryptography in Constant Rounds - the Case of Zero Knowledge. IACR Cryptol. ePrint Arch. 2011: 408 (2011) - [i21]Raghav Bhaskar, Abhishek Bhowmick, Vipul Goyal, Srivatsan Laxman, Abhradeep Thakurta:
Noiseless Database Privacy. IACR Cryptol. ePrint Arch. 2011: 487 (2011) - [i20]Vipul Goyal:
Positive Results for Concurrently Secure Computation in the Plain Model. IACR Cryptol. ePrint Arch. 2011: 602 (2011) - 2010
- [c24]Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai:
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography. CRYPTO 2010: 173-190 - [c23]Vipul Goyal, Abhishek Jain, Rafail Ostrovsky:
Password-Authenticated Session-Key Generation on the Internet in the Plain Model. CRYPTO 2010: 277-294 - [c22]Vipul Goyal, Abhishek Jain:
On the round complexity of covert computation. STOC 2010: 191-200 - [c21]Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia:
Founding Cryptography on Tamper-Proof Hardware Tokens. TCC 2010: 308-326 - [i19]Vipul Goyal, Sugata Sanyal, Dharma P. Agrawal:
Vcache: Caching Dynamic Documents. CoRR abs/1003.2616 (2010) - [i18]Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner:
Position-Based Quantum Cryptography: Impossibility and Constructions. CoRR abs/1009.2490 (2010) - [i17]Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai:
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography. Electron. Colloquium Comput. Complex. TR10 (2010) - [i16]Vipul Goyal, Yuval Ishai, Mohammad Mahmoody, Amit Sahai:
Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography. IACR Cryptol. ePrint Arch. 2010: 89 (2010) - [i15]Vipul Goyal, Yuval Ishai, Amit Sahai, Ramarathnam Venkatesan, Akshay Wadia:
Founding Cryptography on Tamper-Proof Hardware Tokens. IACR Cryptol. ePrint Arch. 2010: 153 (2010) - [i14]Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner:
Position-Based Quantum Cryptography: Impossibility and Constructions. IACR Cryptol. ePrint Arch. 2010: 275 (2010) - [i13]Vipul Goyal, Abhishek Jain:
On the Round Complexity of Covert Computation. IACR Cryptol. ePrint Arch. 2010: 279 (2010) - [i12]Vipul Goyal:
Constant Round Non-Malleable Protocols using One Way Functions. IACR Cryptol. ePrint Arch. 2010: 487 (2010)
2000 – 2009
- 2009
- [c20]Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky:
Position Based Cryptography. CRYPTO 2009: 391-407 - [c19]Vipul Goyal, Amit Sahai:
Resettably Secure Computation. EUROCRYPT 2009: 54-71 - [c18]Yi Deng, Vipul Goyal, Amit Sahai:
Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy. FOCS 2009: 251-260 - [i11]Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky:
Position Based Cryptography. IACR Cryptol. ePrint Arch. 2009: 364 (2009) - 2008
- [c17]Alexandra Boldyreva, Vipul Goyal, Virendra Kumar:
Identity-based encryption with efficient revocation. CCS 2008: 417-426 - [c16]Vipul Goyal, Steve Lu, Amit Sahai, Brent Waters:
Black-box accountable authority identity-based encryption. CCS 2008: 427-436 - [c15]Vipul Goyal, Payman Mohassel, Adam D. Smith:
Efficient Two Party and Multi Party Computation Against Covert Adversaries. EUROCRYPT 2008: 289-306 - [c14]Nishanth Chandran, Vipul Goyal, Amit Sahai:
New Constructions for UC Secure Computation Using Tamper-Proof Hardware. EUROCRYPT 2008: 545-562 - [c13]Vipul Goyal, Abhishek Jain, Omkant Pandey, Amit Sahai:
Bounded Ciphertext Policy Attribute Based Encryption. ICALP (2) 2008: 579-591 - [c12]Vipul Goyal, Jonathan Katz:
Universally Composable Multi-party Computation with an Unreliable Common Reference String. TCC 2008: 142-154 - [i10]Vipul Goyal, Amit Sahai:
Resolving the Simultaneous Resettability Conjecture and a New Non-Black-Box Simulation Strategy. IACR Cryptol. ePrint Arch. 2008: 545 (2008) - 2007
- [c11]Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai:
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions. ASIACRYPT 2007: 444-459 - [c10]Vipul Goyal:
Reducing Trust in the PKG in Identity Based Cryptosystems. CRYPTO 2007: 430-447 - [c9]Vipul Goyal:
Certificate Revocation Using Fine Grained Certificate Space Partitioning. Financial Cryptography 2007: 247-259 - [c8]Nishanth Chandran, Vipul Goyal, Rafail Ostrovsky, Amit Sahai:
Covert Multi-Party Computation. FOCS 2007: 238-248 - [i9]Nishanth Chandran, Vipul Goyal, Amit Sahai:
New Constructions for UC Secure Computation using Tamper-proof Hardware. IACR Cryptol. ePrint Arch. 2007: 334 (2007) - [i8]Vipul Goyal:
Reducing Trust in the PKG in Identity Based Cryptosystems. IACR Cryptol. ePrint Arch. 2007: 368 (2007) - [i7]Vipul Goyal, Jonathan Katz:
Universally Composable Multi-Party Computation with an Unreliable Common Reference String. IACR Cryptol. ePrint Arch. 2007: 369 (2007) - 2006
- [j1]Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal:
A new protocol to counter online dictionary attacks. Comput. Secur. 25(2): 114-120 (2006) - [c7]Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters:
Attribute-based encryption for fine-grained access control of encrypted data. CCS 2006: 89-98 - [i6]Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters:
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. IACR Cryptol. ePrint Arch. 2006: 309 (2006) - [i5]Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky, Amit Sahai:
Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions. IACR Cryptol. ePrint Arch. 2006: 400 (2006) - 2005
- [c6]Vipul Goyal, Rohit Tripathy:
An Efficient Solution to the ARP Cache Poisoning Problem. ACISP 2005: 40-51 - [c5]Vipul Goyal, Abhishek Jain, Jean-Jacques Quisquater:
Improvements to Mitchell's Remote User Authentication Protocol. ICISC 2005: 69-80 - [c4]Vipul Goyal, Ajith Abraham, Sugata Sanyal, Sang-Yong Han:
The N/R One Time Password System. ITCC (1) 2005: 733-738 - [c3]Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal:
CompChall: Addressing Password Guessing Attacks. ITCC (1) 2005: 739-744 - 2004
- [c2]Vipul Goyal:
Fast Digital Certificate Revocation. SEC 2004: 489-500 - [c1]Vipul Goyal:
Certificate Revocation Lists or Online Mechanisms. WOSIS 2004: 261-268 - [i4]Vipul Goyal:
How To Re-initialize a Hash Chain. IACR Cryptol. ePrint Arch. 2004: 97 (2004) - [i3]Vipul Goyal:
More Efficient Server Assisted One Time Signatures. IACR Cryptol. ePrint Arch. 2004: 135 (2004) - [i2]Vipul Goyal, Virendra Kumar, Mayank Singh, Ajith Abraham, Sugata Sanyal:
CompChall: Addressing Password Guessing Attacks. IACR Cryptol. ePrint Arch. 2004: 136 (2004) - [i1]Vipul Goyal:
Construction and Traversal of Hash Chain with Public Links. IACR Cryptol. ePrint Arch. 2004: 371 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint