Chethan Kamath
Chethan Kamath
Verified email at ist.ac.at - Homepage
Title
Cited by
Cited by
Year
On the complexity of scrypt and proofs of space in the parallel random oracle model
J Alwen, B Chen, C Kamath, V Kolmogorov, K Pietrzak, S Tessaro
Annual International Conference on the Theory and Applications of …, 2016
302016
Be adaptive, avoid overcommitting
Z Jafargholi, C Kamath, K Klein, I Komargodski, K Pietrzak, D Wichs
Annual International Cryptology Conference, 133-163, 2017
272017
Galindo-Garcia identity-based signature revisited
S Chatterjee, C Kamath, V Kumar
International Conference on Information Security and Cryptology, 456-471, 2012
212012
Finding a Nash equilibrium is no easier than breaking Fiat-Shamir
AR Choudhuri, P Hubáček, C Kamath, K Pietrzak, A Rosen, GN Rothblum
Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing …, 2019
182019
Practical round-optimal blind signatures in the standard model from weaker assumptions
G Fuchsbauer, C Hanser, C Kamath, D Slamanig
International Conference on Security and Cryptography for Networks, 391-408, 2016
152016
On the memory-hardness of data-independent password-hashing functions
J Alwen, P Gazi, C Kamath, K Klein, G Osang, K Pietrzak, L Reyzin, ...
Proceedings of the 2018 on Asia Conference on Computer and Communications …, 2018
142018
PPAD-Hardness via Iterated Squaring Modulo a Composite.
AR Choudhuri, P Hubácek, C Kamath, K Pietrzak, A Rosen, GN Rothblum
IACR Cryptol. ePrint Arch. 2019, 667, 2019
112019
Keep the Dirt: Tainted TreeKEM, an Efficient and Provably Secure Continuous Group Key Agreement Protocol.
J Alwen, M Capretto, M Cueto, C Kamath, K Klein, G Pascual-Perez, ...
IACR Cryptol. ePrint Arch. 2019, 1489, 2019
9*2019
Adaptively secure proxy re-encryption
G Fuchsbauer, C Kamath, K Klein, K Pietrzak
IACR International Workshop on Public Key Cryptography, 317-346, 2019
82019
A Closer Look at Multiple Forking: Leveraging (In)Dependence for a Tighter Bound
S Chatterjee, C Kamath
Algorithmica 74 (4), 1321-1362, 2016
72016
Reversible proofs of sequential work
H Abusalah, C Kamath, K Klein, K Pietrzak, M Walter
Annual International Conference on the Theory and Applications of …, 2019
42019
From selective-id to full-id IBS without random oracles
S Chatterjee, C Kamath
International Conference on Security, Privacy, and Applied Cryptography …, 2013
12013
On the Average-Case Hardness of Total Search Problems
C Kamath
Institute of Science and Technology Austria, Klosterneuburg, Austria, 2020
2020
Private set-intersection with common set-up
S Chatterjee, C Kamath, V Kumar
Advances in Mathematics of Communications 12 (1), 17, 2018
2018
Space-Time Trade-offs.
C Kamath
2017
Constructing Provably Secure Identity-Based Signature Schemes.
C Kamath
2015
Galindo-Garcia Identity-Based Signature, Improved
S Chatterjee, C Kamath
2013
On Average-Case Hardness in TFNP from One-Way Functions⋆
P Hubáček, C Kamath, K Král, V Slívová
The system can't perform the operation now. Try again later.
Articles 1–18