Sotabase
Home
Researchers
Career
·
Co-Founder and CTO
,
Aluna (formerly KNOX Medical)
2016–
·
JUTLA DEVELOPMENTS LIMITED
Publications
(97)
Towards Sound Approaches to Counteract Power-Analysis Attacks
Annual International Cryptology Conference · 1999
1,222
cited
Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries
IACR Cryptology ePrint Archive · 2013
926
cited
Tree Automata, Mu-Calculus and Determinacy (Extended Abstract)
IEEE Annual Symposium on Foundations of Computer Science · 1991
840
cited
Dynamic Searchable Encryption in Very-Large Databases: Data Structures and Implementation
Network and Distributed System Security Symposium · 2014
776
cited
The complexity of tree automata and logics of programs
[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science · 1988
515
cited
On Model-Checking for Fragments of µ-Calculus
International Conference on Computer Aided Verification · 1993
314
cited
Efficient Rijndael Encryption Implementation with Composite Field Arithmetic
Workshop on Cryptographic Hardware and Embedded Systems · 2001
312
cited
MARS - a candidate cipher for AES
1999
245
cited
Encryption Modes with Almost Free Message Integrity
Journal of Cryptology · 2001
224
cited
Tree automata, mu-calculus and determinacy
[1991] Proceedings 32nd Annual Symposium of Foundations of Computer Science · 1991
219
cited
Outsourced symmetric private information retrieval
IACR Cryptology ePrint Archive · 2013
216
cited
Optimizing ORAM and Using It Efficiently for Secure Computation
International Symposium on Privacy Enhancing Technologies · 2013
206
cited
Shorter Quasi-Adaptive NIZK Proofs for Linear Subspaces
Journal of Cryptology · 2013
178
cited
Cryptanalysis of Stream Ciphers with Linear Masking
Annual International Cryptology Conference · 2002
143
cited
Secure distributed storage and retrieval
Theoretical Computer Science · 1997
139
cited
On model checking for the µ-calculus and its fragments
Theoretical Computer Science · 2001
121
cited
Testing low-degree polynomials over prime fields
45th Annual IEEE Symposium on Foundations of Computer Science · 2004
94
cited
Private Database Access with HE-over-ORAM Architecture
International Conference on Applied Cryptography and Network Security · 2015
72
cited
Switching Lemma for Bilinear Tests and Constant-Size NIZK Proofs for Linear Subspaces
Annual International Cryptology Conference · 2014
67
cited
Parallelizable Authentication Trees
IACR Cryptology ePrint Archive · 2005
66
cited
Show all 97 papers →
Sotabase
Charanjit Jutla | Researcher Profile | Sotabase | Sotabase