What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Sushmita Ruj
Google Scholar
ORCID:
0000-0002-8698-6709
17
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/asiaccs
Towards Usability of Data with Privacy: A Unified Framework for Privacy-Preserving Data Sharing with High Utility.
M. A. P. Chamikara
Seung Ick Jang
Ian J. Oppermann
Dongxi Liu
Musotto Roberto
Sushmita Ruj
Arindam Pal
Meisam Mohammady
Seyit Camtepe
Sylvia Young
Chris Dorrian
Nasir David
2024
journals/popets
SoK: Trusting Self-Sovereign Identity.
Evan Krul
Hye-young Paik
Sushmita Ruj
Salil S. Kanhere
2024
conf/acisp
DualRing-PRF: Post-quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs.
Xinyu Zhang
Ron Steinfeld
Joseph K. Liu
Muhammed F. Esgin
Dongxi Liu
Sushmita Ruj
2024
conf/crypto
Loquat: A SNARK-Friendly Post-quantum Signature Based on the Legendre PRF with Applications in Ring and Aggregate Signatures.
Xinyu Zhang
Ron Steinfeld
Muhammed F. Esgin
Joseph K. Liu
Dongxi Liu
Sushmita Ruj
2024
conf/dsn
Zero-Knowledge Proofs for Blockchains.
Sushmita Ruj
2023
conf/crypto
Efficient Hybrid Exact/Relaxed Lattice Proofs and Applications to Rounding and VRFs.
Muhammed F. Esgin
Ron Steinfeld
Dongxi Liu
Sushmita Ruj
2022
conf/esorics
LightSwap: An Atomic Swap Does Not Require Timeouts at both Blockchains.
Philipp Hoenisch
Subhra Mazumdar
Pedro Moreno-Sanchez
Sushmita Ruj
2021
conf/icbc2
Towards Privacy-preserving Digital Contact Tracing.
Nadeem Ahmed
Regio A. Michelin
Wanli Xue
Guntur Dharma Putra
Wei Song
Sushmita Ruj
Salil S. Kanhere
Sanjay K. Jha
2020
conf/iciss
Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings.
Sabyasachi Dutta
Md Kutubuddin Sardar
Avishek Adhikari
Sushmita Ruj
Kouichi Sakurai
2020
conf/icbc2
HushRelay: A Privacy-Preserving, Efficient, and Scalable Routing Algorithm for Off-Chain Payments.
Subhra Mazumdar
Sushmita Ruj
Ram Govind Singh
Arindam Pal
2019
conf/provsec
FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE Scheme.
Laltu Sardar
Sushmita Ruj
2018
journals/compsec
On the economic significance of ransomware campaigns: A Bitcoin transactions perspective.
Mauro Conti
Ankit Gangwal
Sushmita Ruj
2017
journals/tifs
Bitcoin Block Withholding Attack: Analysis and Mitigation.
Samiran Bag
Sushmita Ruj
Kouichi Sakurai
2017
conf/acisp
Certificate Transparency with Enhancements and Short Proofs.
Abhishek Singh
Binanda Sengupta
Sushmita Ruj
2016
conf/ccs
Publicly Verifiable Secure Cloud Storage for Dynamic Data Using Secure Network Coding.
Binanda Sengupta
Sushmita Ruj
2014
conf/cans
Should Silence be Heard? Fair Rational Secret Sharing with Silent and Non-silent Players.
Sourya Joyee De
Sushmita Ruj
Asim K. Pal
2013
conf/iciss
Jamming Resistant Schemes for Wireless Communication: A Combinatorial Approach.
Samiran Bag
Sushmita Ruj
Bimal K. Roy
Coauthors
Abhishek Singh
(1)
Ankit Gangwal
(1)
Arindam Pal
(2)
Asim K. Pal
(1)
Avishek Adhikari
(1)
Bimal K. Roy
(1)
Binanda Sengupta
(2)
Chris Dorrian
(1)
Dongxi Liu
(4)
Evan Krul
(1)
Guntur Dharma Putra
(1)
Hye-young Paik
(1)
Ian J. Oppermann
(1)
Joseph K. Liu
(2)
Kouichi Sakurai
(2)
Laltu Sardar
(1)
M. A. P. Chamikara
(1)
Mauro Conti
(1)
Md Kutubuddin Sardar
(1)
Meisam Mohammady
(1)
Muhammed F. Esgin
(3)
Musotto Roberto
(1)
Nadeem Ahmed
(1)
Nasir David
(1)
Pedro Moreno-Sanchez
(1)
Philipp Hoenisch
(1)
Ram Govind Singh
(1)
Regio A. Michelin
(1)
Ron Steinfeld
(3)
Sabyasachi Dutta
(1)
Salil S. Kanhere
(2)
Samiran Bag
(2)
Sanjay K. Jha
(1)
Seung Ick Jang
(1)
Seyit Camtepe
(1)
Sourya Joyee De
(1)
Subhra Mazumdar
(2)
Sushmita Ruj
(17)
Sylvia Young
(1)
Wanli Xue
(1)
Wei Song
(1)
Xinyu Zhang
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to