default search action
Venkata Koppula
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c30]Kaartik Bhushan, Venkata Koppula, Manoj Prabhakaran:
Homomorphic Indistinguishability Obfuscation and Its Applications. ITCS 2024: 14:1-14:21 - [c29]Avantika Agarwal, Sevag Gharibian, Venkata Koppula, Dorian Rudolph:
Quantum Polynomial Hierarchies: Karp-Lipton, Error Reduction, and Lower Bounds. MFCS 2024: 7:1-7:17 - [i29]Avantika Agarwal, Sevag Gharibian, Venkata Koppula, Dorian Rudolph:
Quantum Polynomial Hierarchies: Karp-Lipton, error reduction, and lower bounds. CoRR abs/2401.01633 (2024) - [i28]Rishab Goyal, Venkata Koppula, Mahesh Sreekumar Rajasree, Aman Verma:
Incompressible Functional Encryption. IACR Cryptol. ePrint Arch. 2024: 798 (2024) - 2023
- [i27]Kaartik Bhushan, Venkata Koppula, Manoj Prabhakaran:
Homomorphic Indistinguishability Obfuscation and its Applications. IACR Cryptol. ePrint Arch. 2023: 925 (2023) - 2022
- [c28]Venkata Koppula, Brent Waters, Mark Zhandry:
Adaptive Multiparty NIKE. TCC (2) 2022: 244-273 - [i26]Venkata Koppula, Brent Waters, Mark Zhandry:
Adaptive Multiparty NIKE. IACR Cryptol. ePrint Arch. 2022: 1324 (2022) - 2020
- [j1]Rishab Goyal, Venkata Koppula, Brent Waters:
Collusion Resistant Traitor Tracing from Learning with Errors. SIAM J. Comput. 49(5) (2020) - [c27]Zvika Brakerski, Venkata Koppula, Tamer Mour:
NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations. CRYPTO (3) 2020: 738-767 - [c26]Susan Hohenberger, Venkata Koppula, Brent Waters:
Chosen Ciphertext Security from Injective Trapdoor Functions. CRYPTO (1) 2020: 836-866 - [c25]Rishab Goyal, Venkata Koppula, Satyanarayana Vusirikala, Brent Waters:
On Perfect Correctness in (Lockable) Obfuscation. TCC (1) 2020: 229-259 - [c24]Zvika Brakerski, Venkata Koppula, Umesh V. Vazirani, Thomas Vidick:
Simpler Proofs of Quantumness. TQC 2020: 8:1-8:14 - [i25]Zvika Brakerski, Venkata Koppula, Umesh V. Vazirani, Thomas Vidick:
Simpler Proofs of Quantumness. CoRR abs/2005.04826 (2020) - [i24]Zvika Brakerski, Venkata Koppula, Tamer Mour:
NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations. IACR Cryptol. ePrint Arch. 2020: 258 (2020) - [i23]Susan Hohenberger, Venkata Koppula, Brent Waters:
Chosen Ciphertext Security from Injective Trapdoor Functions. IACR Cryptol. ePrint Arch. 2020: 759 (2020)
2010 – 2019
- 2019
- [c23]Saikrishna Badrinarayanan, Rex Fernando, Venkata Koppula, Amit Sahai, Brent Waters:
Output Compression, MPC, and iO for Turing Machines. ASIACRYPT (1) 2019: 342-370 - [c22]Venkata Koppula, Brent Waters:
Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption. CRYPTO (2) 2019: 671-700 - [c21]Dennis Hofheinz, Akshay Kamath, Venkata Koppula, Brent Waters:
Adaptively Secure Constrained Pseudorandom Functions. Financial Cryptography 2019: 357-376 - [c20]Rishab Goyal, Venkata Koppula, Brent Waters:
New Approaches to Traitor Tracing with Embedded Identities. TCC (2) 2019: 149-179 - [i22]Rishab Goyal, Venkata Koppula, Brent Waters:
New Approaches to Traitor Tracing with Embedded Identities. IACR Cryptol. ePrint Arch. 2019: 980 (2019) - [i21]Rishab Goyal, Venkata Koppula, Satyanarayana Vusirikala, Brent Waters:
On Perfect Correctness in (Lockable) Obfuscation. IACR Cryptol. ePrint Arch. 2019: 1010 (2019) - 2018
- [c19]Rishab Goyal, Venkata Koppula, Andrew Russell, Brent Waters:
Risky Traitor Tracing and New Differential Privacy Negative Results. CRYPTO (1) 2018: 467-497 - [c18]Rishab Goyal, Venkata Koppula, Brent Waters:
Collusion resistant traitor tracing from learning with errors. STOC 2018: 660-670 - [c17]Shashank Agrawal, Venkata Koppula, Brent Waters:
Impossibility of Simulation Secure Functional Encryption Even with Random Oracles. TCC (1) 2018: 659-688 - [i20]Rishab Goyal, Venkata Koppula, Brent Waters:
Collusion Resistant Traitor Tracing from Learning with Errors. IACR Cryptol. ePrint Arch. 2018: 346 (2018) - [i19]Venkata Koppula, Brent Waters:
Realizing Chosen Ciphertext Security Generically in Attribute-Based Encryption and Predicate Encryption. IACR Cryptol. ePrint Arch. 2018: 847 (2018) - [i18]Saikrishna Badrinarayanan, Rex Fernando, Venkata Koppula, Amit Sahai, Brent Waters:
Output Compression, MPC, and iO for Turing Machines. IACR Cryptol. ePrint Arch. 2018: 866 (2018) - 2017
- [c16]Cody Freitag, Rishab Goyal, Susan Hohenberger, Venkata Koppula, Eysa Lee, Tatsuaki Okamoto, Jordan Tran, Brent Waters:
Signature Schemes with Randomized Verification. ACNS 2017: 373-389 - [c15]Rishab Goyal, Venkata Koppula, Brent Waters:
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption. EUROCRYPT (2) 2017: 528-557 - [c14]Rishab Goyal, Venkata Koppula, Brent Waters:
Lockable Obfuscation. FOCS 2017: 612-621 - [c13]Rishab Goyal, Venkata Koppula, Brent Waters:
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles. Public Key Cryptography (1) 2017: 232-246 - [c12]Venkata Koppula, Andrew Poelstra, Brent Waters:
Universal Samplers with Fast Verification. Public Key Cryptography (2) 2017: 525-554 - [c11]Rishab Goyal, Susan Hohenberger, Venkata Koppula, Brent Waters:
A Generic Approach to Constructing and Proving Verifiable Random Functions. TCC (2) 2017: 537-566 - [i17]Venkata Koppula, Andrew Poelstra, Brent Waters:
Universal Samplers with Fast Verification. IACR Cryptol. ePrint Arch. 2017: 12 (2017) - [i16]Rishab Goyal, Susan Hohenberger, Venkata Koppula, Brent Waters:
A Generic Approach to Constructing and Proving Verifiable Random Functions. IACR Cryptol. ePrint Arch. 2017: 21 (2017) - [i15]Rishab Goyal, Venkata Koppula, Brent Waters:
Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption. IACR Cryptol. ePrint Arch. 2017: 120 (2017) - [i14]Rishab Goyal, Venkata Koppula, Brent Waters:
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles. IACR Cryptol. ePrint Arch. 2017: 123 (2017) - [i13]Rishab Goyal, Venkata Koppula, Brent Waters:
Lockable Obfuscation. IACR Cryptol. ePrint Arch. 2017: 274 (2017) - [i12]Rishab Goyal, Venkata Koppula, Andrew Russell, Brent Waters:
Risky Traitor Tracing and New Differential Privacy Negative Results. IACR Cryptol. ePrint Arch. 2017: 1117 (2017) - 2016
- [c10]Venkata Koppula, Omkant Pandey, Yannis Rouselakis, Brent Waters:
Deterministic Public-Key Encryption Under Continual Leakage. ACNS 2016: 304-323 - [c9]Venkata Koppula, Brent Waters:
Circular Security Separations for Arbitrary Length Cycles from LWE. CRYPTO (2) 2016: 681-700 - [c8]Apoorvaa Deshpande, Venkata Koppula, Brent Waters:
Constrained Pseudorandom Functions for Unconstrained Inputs. EUROCRYPT (2) 2016: 124-153 - [c7]Rishab Goyal, Venkata Koppula, Brent Waters:
Semi-adaptive Security and Bundling Functionalities Made Generic and Easy. TCC (B2) 2016: 361-388 - [i11]Venkata Koppula, Brent Waters:
Circular Security Counterexamples for Arbitrary Length Cycles from LWE. IACR Cryptol. ePrint Arch. 2016: 117 (2016) - [i10]Apoorvaa Deshpande, Venkata Koppula, Brent Waters:
Constrained Pseudorandom Functions for Unconstrained Inputs. IACR Cryptol. ePrint Arch. 2016: 301 (2016) - [i9]Rishab Goyal, Venkata Koppula, Brent Waters:
Semi-Adaptive Security and Bundling Functionalities Made Generic and Easy. IACR Cryptol. ePrint Arch. 2016: 317 (2016) - [i8]Shashank Agrawal, Venkata Koppula, Brent Waters:
Impossibility of Simulation Secure Functional Encryption Even with Random Oracles. IACR Cryptol. ePrint Arch. 2016: 959 (2016) - 2015
- [c6]Susan Hohenberger, Venkata Koppula, Brent Waters:
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model. ASIACRYPT (1) 2015: 79-102 - [c5]Susan Hohenberger, Venkata Koppula, Brent Waters:
Universal Signature Aggregators. EUROCRYPT (2) 2015: 3-34 - [c4]Venkata Koppula, Allison Bishop Lewko, Brent Waters:
Indistinguishability Obfuscation for Turing Machines with Unbounded Memory. STOC 2015: 419-428 - [c3]Vipul Goyal, Abhishek Jain, Venkata Koppula, Amit Sahai:
Functional Encryption for Randomized Functionalities. TCC (2) 2015: 325-351 - [c2]Venkata Koppula, Kim Ramchen, Brent Waters:
Separations in Circular Security for Arbitrary Length Key Cycles. TCC (2) 2015: 378-400 - 2014
- [i7]Susan Hohenberger, Venkata Koppula, Brent Waters:
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model. IACR Cryptol. ePrint Arch. 2014: 521 (2014) - [i6]Dennis Hofheinz, Akshay Kamath, Venkata Koppula, Brent Waters:
Adaptively Secure Constrained Pseudorandom Functions. IACR Cryptol. ePrint Arch. 2014: 720 (2014) - [i5]Susan Hohenberger, Venkata Koppula, Brent Waters:
Universal Signature Aggregators. IACR Cryptol. ePrint Arch. 2014: 745 (2014) - [i4]Venkata Koppula, Omkant Pandey, Yannis Rouselakis, Brent Waters:
Deterministic Public-Key Encryption under Continual Leakage. IACR Cryptol. ePrint Arch. 2014: 780 (2014) - [i3]Venkata Koppula, Allison Bishop Lewko, Brent Waters:
Indistinguishability Obfuscation for Turing Machines with Unbounded Memory. IACR Cryptol. ePrint Arch. 2014: 925 (2014) - 2013
- [i2]Venkata Koppula, Kim Ramchen, Brent Waters:
Separations in Circular Security for Arbitrary Length Key Cycles. IACR Cryptol. ePrint Arch. 2013: 683 (2013) - [i1]Vipul Goyal, Abhishek Jain, Venkata Koppula, Amit Sahai:
Functional Encryption for Randomized Functionalities. IACR Cryptol. ePrint Arch. 2013: 729 (2013) - 2010
- [c1]Abhimanyu M. Ambalath, Radheshyam Balasundaram, Chintan Rao H., Venkata Koppula, Neeldhara Misra, Geevarghese Philip, M. S. Ramanujan:
On the Kernelization Complexity of Colorful Motifs. IPEC 2010: 14-25
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-27 22:53 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint