Dakshita Khurana

If you made any changes in Pure these will be visible here soon.

Fingerprint

Fingerprint is based on mining the text of the expert's scholarly documents to create an index of weighted terms, which defines the key subjects of each individual researcher.
  • 6 Similar Profiles

Network

Recent external collaboration on country level. Dive into details by clicking on the dots.
  • Low error efficient computational extractors in the crs model

    Garg, A., Kalai, Y. T. & Khurana, D., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 373-402 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12105 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • On statistical security in two-party computation

    Khurana, D. & Mughees, M. H., 2020, Theory of Cryptography - 18th International Conference, TCC 2020, Proceedings. Pass, R. & Pietrzak, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 532-561 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12551 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Statistical zap arguments

    Badrinarayanan, S., Fernando, R., Jain, A., Khurana, D. & Sahai, A., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 642-667 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12107 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Non-interactive Non-malleability from Quantum Supremacy

    Kalai, Y. T. & Khurana, D., Jan 1 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Micciancio, D. & Boldyreva, A. (eds.). Springer-Verlag, p. 552-582 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11694 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Weak zero-knowledge beyond the black-box barrier

    Bitansky, N., Khurana, D. & Paneth, O., Jun 23 2019, STOC 2019 - Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing. Charikar, M. & Cohen, E. (eds.). Association for Computing Machinery, p. 1091-1102 12 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

If you made any changes in Pure these will be visible here soon.