Follow
Dhinakaran Vinayagamurthy
Dhinakaran Vinayagamurthy
Researcher at IBM Research India
Verified email at in.ibm.com - Homepage
Title
Cited by
Cited by
Year
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits
D Boneh, C Gentry, S Gorbunov, S Halevi, V Nikolaenko, G Segev, ...
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
4892014
Iron: functional encryption using Intel SGX
B Fisch, D Vinayagamurthy, D Boneh, S Gorbunov
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
1912017
StealthDB: a scalable encrypted database with full SQL query support
D Vinayagamurthy, A Gribov, S Gorbunov
Proceedings on Privacy Enhancing Technologies, 2019
102*2019
Riding on asymmetry: efficient ABE for branching programs
S Gorbunov, D Vinayagamurthy
International Conference on the Theory and Application of Cryptology and …, 2015
632015
ID based signcryption scheme in standard model
SSD Selvi, SS Vivek, D Vinayagamurthy, CP Rangan
Provable Security: 6th International Conference, ProvSec 2012, Chengdu …, 2012
382012
Optimizing ansatz design in QAOA for Max-cut
R Majumdar, D Madan, D Bhoumik, D Vinayagamurthy, S Raghunathan, ...
arXiv preprint arXiv:2106.02812, 2021
242021
Constrained pseudorandom functions: verifiable and delegatable
N Chandran, S Raghuraman, D Vinayagamurthy
Cryptology ePrint Archive, 2014
222014
On the security of id based signcryption schemes
SSD Selvi, SS Vivek, D Vinayagamurthy, CP Rangan
Cryptology ePrint Archive, 2011
122011
Atomic cross-chain exchanges of shared assets
K Narayanam, V Ramakrishna, D Vinayagamurthy, S Nishad
Proceedings of the 4th ACM Conference on Advances in Financial Technologies …, 2022
11*2022
Privacy-preserving decentralized exchange marketplaces
K Govindarajan, D Vinayagamurthy, P Jayachandran, C Rebeiro
2022 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), 1-9, 2022
82022
How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols
P Dayama, A Patra, P Paul, N Singh, D Vinayagamurthy
Proceedings on Privacy Enhancing Technologies, 2022
62022
Reducing Depth in Constrained PRFs: From Bit-Fixing to
N Chandran, S Raghuraman, D Vinayagamurthy
Public-Key Cryptography--PKC 2016, 359-385, 2016
62016
Efficient machine-learning-based decoder for heavy hexagonal QECC
D Bhoumik, R Majumdar, D Madan, D Vinayagamurthy, S Raghunathan, ...
arXiv preprint arXiv:2210.09730, 2022
52022
Depth optimized ansatz circuit in QAOA for Max-Cut
R Majumdar, D Bhoumik, D Madan, D Vinayagamurthy, S Raghunathan, ...
arXiv preprint arXiv:2110.04637, 2021
52021
Trusted Data Notifications from Private Blockchains#
D Behl, P Kodeswaran, V Ramakrishna, S Sen, D Vinayagamurthy
2020 IEEE International Conference on Blockchain (Blockchain), 53-61, 2020
52020
Load balancing between controllers
D Vinayagamurthy, J Balasundaram
University of Toronto, 2012
52012
Verifying confidential machine learning models
PS Dayama, N Singh, D Vinayagamurthy, V Pandit
US Patent 11,481,680, 2022
32022
Classical ensemble of Quantum-classical ML algorithms for Phishing detection in Ethereum transaction networks
A Ray, SS Guddanti, V Ajith, D Vinayagamurthy
arXiv preprint arXiv:2211.00004, 2022
22022
Private certifier intersection
BC Ghosh, S Patranabis, D Vinayagamurthy, V Ramakrishna, ...
Cryptology ePrint Archive, 2022
22022
Protection of data of database clients from persistent adversaries
D Vinayagamurthy, U Singhal, A Kaul
US Patent 11,836,269, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20