Follow
Yashvanth Kondi
Yashvanth Kondi
Silence Laboratories (employed by Deel)
Verified email at silencelaboratories.com - Homepage
Title
Cited by
Cited by
Year
Secure two-party threshold ECDSA from ECDSA assumptions
J Doerner, Y Kondi, E Lee, A Shelat
2018 IEEE Symposium on Security and Privacy (SP), 980-997, 2018
1692018
Threshold ECDSA from ECDSA assumptions: The multiparty case
J Doerner, Y Kondi, E Lee, A Shelat
2019 IEEE Symposium on Security and Privacy (SP), 1051-1066, 2019
1402019
Multiparty generation of an RSA modulus
M Chen, J Doerner, Y Kondi, E Lee, S Rosefield, A Shelat, R Cohen
Journal of Cryptology 35 (2), 12, 2022
362022
Refresh when you wake up: Proactive threshold wallets with offline devices
Y Kondi, B Magri, C Orlandi, O Shlomovits
2021 IEEE Symposium on Security and Privacy (SP), 608-625, 2021
292021
Threshold schnorr with stateless deterministic signing from standard assumptions
F Garillot, Y Kondi, P Mohassel, V Nikolaenko
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
262021
Efficient adaptively secure zero-knowledge from garbled circuits
C Ganesh, Y Kondi, A Patra, P Sarkar
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
192018
Improved straight-line extraction in the random oracle model with applications to signature aggregation
Y Kondi, A Shelat
International Conference on the Theory and Application of Cryptology and …, 2022
182022
Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures
K Chalkias, F Garillot, Y Kondi, V Nikolaenko
Cryptographers’ Track at the RSA Conference, 577-608, 2021
182021
Analysis of a coverstitched stretch sensor for monitoring of breathing
RI Ramos-Garcia, F Da Silva, Y Kondi, E Sazonov, LE Dunne
2016 10th international conference on sensing technology (ICST), 1-6, 2016
172016
Witness-succinct universally-composable snarks
C Ganesh, Y Kondi, C Orlandi, M Pancholi, A Takahashi, D Tschudi
Annual International Conference on the Theory and Applications of …, 2023
142023
Threshold BBS+ signatures for distributed anonymous credential issuance
J Doerner, Y Kondi, E Lee, LK Tyner
Cryptology ePrint Archive, 2023
142023
Privacy-free garbled circuits for formulas: size zero and information-theoretic
Y Kondi, A Patra
Annual International Cryptology Conference, 188-222, 2017
112017
Threshold ECDSA in Three Rounds
J Doerner, Y Kondi, E Lee
Cryptology ePrint Archive, 2023
72023
Two-Round Stateless Deterministic Two-Party Schnorr Signatures From Pseudorandom Correlation Functions
Y Kondi, C Orlandi, L Roy
Annual International Cryptology Conference, 646-677, 2023
52023
A. shelat,“
J Doerner, Y Kondi, E Lee
Scaling ORAM for secure computation,” in CCS 17, 2019
52019
Guaranteed Output in Rounds for Round-Robin Sampling Protocols
R Cohen, J Doerner, Y Kondi, A Shelat
Annual International Conference on the Theory and Applications of …, 2022
42022
Sometimes You Can’t Distribute Random-Oracle-Based Proofs
J Doerner, Y Kondi, LN Rosenbloom
Cryptology ePrint Archive, 2023
2023
Secure Multiparty Computation with Identifiable Abort from Vindicating Release
R Cohen, J Doerner, Y Kondi
Cryptology ePrint Archive, 2023
2023
Practical Threshold Elliptic Curve Cryptography From Native Assumptions
Y Kondi
Northeastern University, 2022
2022
An interdisciplinary, dialogic approach to develop an electronic device to enhance freedom and mobility of women in public spaces in the Indian context—Illustrated by the case …
YM Kondi, D Varshneya, S Krishnan, M Rao
2014 IEEE Global Humanitarian Technology Conference-South Asia Satellite …, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–20