Stadium: A distributed metadata-private messaging system N Tyagi, Y Gilad, D Leung, M Zaharia, N Zeldovich Proceedings of the 26th Symposium on Operating Systems Principles, 423-440, 2017 | 167 | 2017 |
Proofs for inner pairing products and applications B Bünz, M Maller, P Mishra, N Tyagi, P Vesely Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021 | 106 | 2021 |
Asymmetric message franking: content moderation for metadata-private end-to-end encryption N Tyagi, P Grubbs, J Len, I Miers, T Ristenpart CRYPTO, 222-250, 2019 | 40 | 2019 |
Energy-efficient algorithms ED Demaine, J Lynch, GJ Mirano, N Tyagi Proceedings of the 2016 ACM Conference on Innovations in Theoretical …, 2016 | 36 | 2016 |
VeRSA: Verifiable registries with efficient client audits from RSA authenticated dictionaries N Tyagi, B Fisch, A Zitek, J Bonneau, S Tessaro Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 32* | 2022 |
Traceback for end-to-end encrypted messaging N Tyagi, I Miers, T Ristenpart Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 32 | 2019 |
A fast and simple partially oblivious PRF, with applications N Tyagi, S Celi, T Ristenpart, N Sullivan, S Tessaro, CA Wood Annual International Conference on the Theory and Applications of …, 2022 | 25* | 2022 |
BurnBox: Self-Revocable Encryption in a World Of Compelled Access N Tyagi, MH Mughees, T Ristenpart, I Miers 27th USENIX Security Symposium (USENIX Security 18), 445-461, 2018 | 15 | 2018 |
Bicorn: An optimistically efficient distributed randomness beacon K Choi, A Arun, N Tyagi, J Bonneau International Conference on Financial Cryptography and Data Security, 235-251, 2023 | 14 | 2023 |
Handling adaptive compromise for practical encryption schemes J Jaeger, N Tyagi Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 13 | 2020 |
Toward an energy efficient language and compiler for (partially) reversible algorithms N Tyagi, J Lynch, ED Demaine International Conference on Reversible Computation, 121-136, 2016 | 9 | 2016 |
Mangrove: A scalable framework for folding-based SNARKs W Nguyen, T Datta, B Chen, N Tyagi, D Boneh Annual International Cryptology Conference, 308-344, 2024 | 8 | 2024 |
Muxproofs: Succinct arguments for machine computation from tuple lookups Z Di, L Xia, W Nguyen, N Tyagi Cryptology ePrint Archive, 2023 | 6 | 2023 |
Orca: Blocklisting in {Sender-Anonymous} Messaging N Tyagi, J Len, I Miers, T Ristenpart 31st USENIX Security Symposium (USENIX Security 22), 2299-2316, 2022 | 6 | 2022 |
Riggs: Decentralized sealed-bid auctions N Tyagi, A Arun, C Freitag, R Wahby, J Bonneau, D Mazières Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 4 | 2023 |
Private Hierarchical Governance for Encrypted Messaging A Namavari, B Wang, S Menda, B Nassi, N Tyagi, J Grimmelmann, ... 2024 IEEE Symposium on Security and Privacy (SP), 255-255, 2024 | | 2024 |
Privacy-Preserving Accountability in Online Messaging N Tyagi Cornell University, 2023 | | 2023 |