Hemanta K. Maji
Purdue University
H-index: 19
North America-United States
Top articles of Hemanta K. Maji
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
GreedyML: A Parallel Algorithm for Maximizing Submodular Functions | arXiv preprint arXiv:2403.10332 | Shivaram Gopal SM Ferdous Hemanta K Maji Alex Pothen | 2024/3/15 |
Unconditional Security using (Random) Anonymous Bulletin Board | Cryptology ePrint Archive | Albert Yu Hai H Nguyen Aniket Kate Hemanta K Maji | 2024 |
Randomized Functions with High Round Complexity | Saugata Basu Hamidreza Amini Khorasgani Hemanta K Maji Hai H Nguyen | 2023/11/27 | |
SIM: Secure Interval Membership Testing and Applications to Secure Comparison | Albert Yu Donghang Lu Aniket Kate Hemanta K Maji | 2023/7/3 | |
The chromatic number of squares of random graphs | The journal of combinatorics | Kalyan Garapaty Daniel Lokshtanov Hemanta K Maji Alex Pothen | 2023/1 |
Leakage-resilient linear secret-sharing against arbitrary bounded-size leakage family | Hemanta K Maji Hai H Nguyen Anat Paskin-Cherniavsky Tom Suad Mingyuan Wang | 2022/11/7 | |
Secure non-interactive simulation from arbitrary joint distributions | Hamidreza Amini Khorasgani Hemanta K Maji Hai H Nguyen | 2022/11/7 | |
Geometry of secure two-party computation | Saugata Basu Hamidreza Amini Khorasgani Hemanta K Maji Hai H Nguyen | 2022/10/31 | |
Tight Estimate of the Local Leakage Resilience of the Additive Secret-Sharing Scheme {\&} Its Consequences | 3rd Conference on Information-Theoretic Cryptography, ITC | Hemanta K Maji Hai H Nguyen Anat Paskin Tom Suad Mingyuan Wang | 2022/7 |
Improved bound on the local leakage-resilience of Shamir’s secret sharing | Hemanta K Maji Hai H Nguyen Anat Paskin-Cherniavsky Mingyuan Wang | 2022/6/26 | |
Secure non-interactive simulation: feasibility and rate | Hamidreza Amini Khorasgani Hemanta K Maji Hai H Nguyen | 2022/5/25 | |
Polymath: Low-latency mpc via secure polynomial evaluations and its applications | Proceedings on Privacy Enhancing Technologies | Donghang Lu Albert Yu Aniket Kate Hemanta Maji | 2021/11 |
Lower bounds for leakage-resilient secret-sharing schemes against probing attacks | Donald Q Adams Hemanta K Maji Hai H Nguyen Minh L Nguyen Anat Paskin-Cherniavsky | 2021/7/12 | |
Optimally-secure Coin-tossing against a Byzantine Adversary | Hamidreza Amini Khorasgani Hemanta K Maji Mingyuan Wang | 2021/7/12 | |
P-free Partition and Cover Numbers {\&} Applications | 2nd Conference on Information-Theoretic Cryptography,{ITC} 2021, July 23-26, 2021, Virtual Conference | Alexander Block Simina Branzei Hemanta Maji Himanshi Mehta Tamalika Mukherjee | 2021/9 |
Leakage-resilience of the shamir secret-sharing scheme against physical-bit leakages | Hemanta K Maji Hai H Nguyen Anat Paskin-Cherniavsky Tom Suad Mingyuan Wang | 2021/6/16 | |
Computational hardness of optimal fair computation: Beyond minicrypt | Hemanta K Maji Mingyuan Wang | 2021/8/11 | |
P₄-free Partition and Cover Numbers & Applications | Alexander R Block Simina Brânzei Hemanta K Maji Himanshi Mehta Tamalika Mukherjee | 2021 | |
Constructing locally leakage-resilient linear secret-sharing schemes | Hemanta K Maji Anat Paskin-Cherniavsky Tom Suad Mingyuan Wang | 2021/8/11 | |
Decidability of secure non-interactive simulation of doubly symmetric binary source | Cryptology ePrint Archive | Hamidreza Amini Khorasgani Hemanta K Maji Hai H Nguyen | 2021 |