Publications

Evaluating Adversarial Robustness of Secret Key-Based Defenses
Deep forest model for diagnosing COVID-19 from routine blood tests
Incremental Deployment of Hybrid IP/SDN Network with Optimized Traffic Engineering
Ensemble learning model for diagnosing COVID-19 from routine blood tests
Fair and Privacy-Respecting Bitcoin Payments for Smart Grid Data
Universal Multi-party Poisoning Attacks
The Computational Complexity of Program Obfuscation
When does Functional Encryption Imply Obfuscation?
Lower Bounds on Indistinguishability Obfuscation from All-or-Nothing Encryption Primitives
On the Power of Hierarchical Identity-based Encryption
Lower Bounds on Assumptions Behind Indistinguishability Obfuscation
On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models
Cryptographic Applications of Learning with Errors