•  About
    • About the Lab
    • Director’s Note
    • Our Vision
    • Founding Donor
    • Advisory Board
    • Principal Investigators
  • People
    • Associated Faculty
    • Executive Committee
    • Students
    • Program Directorate
  • TrustNet
  •  Projects
  •  Resources
    • Pre-Doctoral Program
    • Internships
    • Early Career Award
    • Trust Lab Grant
    • Trust Lab Fellowship
  •  News
    • Trust Matters
    • Quick Updates
  •  Events
    • Talks
    • Trust Summit
    • TL CTF
    • Schools
    • All Events
  •  Engage
  •  About
    • About the Lab
    • Director’s Note
    • Our Vision
    • Founding Donor
    • Advisory Board
    • Principal Investigators
  • People
    • Associated Faculty
    • Executive Committee
    • Students
    • Program Directorate
  • TrustNet
  •  Projects
  •  Resources
    • Pre-Doctoral Program
    • Internships
    • Early Career Award
    • Trust Lab Grant
    • Trust Lab Fellowship
  •  News
    • Trust Matters
    • Quick Updates
  •  Events
    • Talks
    • Trust Summit
    • TL CTF
    • Schools
    • All Events
  •  Engage

Talks

Optimal Block Production in Blockchain: A Parameterized Approach
Soroush Farrokhnia
New leakage models: How to deal with rejection
Maciej Obremski
HotStuff-1: Linear Consensus with One-Phase Speculation
Suyash Gupta
Fair Exchange on Bitcoin
Pratik Soni
Cryptography Meets Game Theory: A Match For Fair Exchange
AravindaKrishnan Thyagarajan
New Threshold Encryption Schemes and their applications in PBS and Mempool Privacy
Guru Vamsi Policharla
Exploring Trust, Innovation, and Cyber Resilience in the Age of AI​
Shirish Puranik
The Concrete Security of Two-Party Computation
Rishabh Ranjan
Trustworthy Generative AI
Lav Varshney
Reliable Quantum Computing Needs Intelligent Software and Hardware
Moinuddin K. Qureshi
The Communication Complexity Landscape of Information-theoretic MPC
Arpita Patra
Separating Broadcast from Cheater Identification
Yashvanth Kondi
Advanced Encryption Scheme from Pairing-based Succinct Argument
Mingyuan Wang
Efficiently Testable Circuits
Mirza Ahad Baig
Rolling a dice on Blockchain at a discount
Pratyay Mukherjee
Batch Proofs are Statistically Hiding
Prashant Nalini Vasudevan
The Microsoft-CrowdStrike Incident and its Policy Implications
Sundeep Oberoi
Testbeds for Evaluating Cybersecurity Systems
Alefiya Hussain
Revisiting the Efficiency of Asynchronous MPC with Optimal Resilience Against General Adversaries
Ashish Choudhury
Cryptography in the Post-Snowden Era
Suvradip Chakraborty
On Designing Social Norm-Grounded Privacy Preserving Systems
Mainack Mondal
Upgrading Security of Encryption Schemes
Venkata Koppula
Scalable Mixed-Mode MPC
Radhika Garg
Security of Nakamoto Consensus under Congestion
Srivatsan Sridhar
The HEVM Symbolic Simulation Framework
Mate Soos
Improving Memory Security and Reliability by Overcoming the Threat of Rowhammer
Moinuddin Qureshi
Cryptanalysis of some Lattice-based Assumptions
Dipayan Das
Trustworthy, Efficient, and Robust Distributed Systems
Saurav Prakash
Securing Processors against Side-Channel Attacks: CPU Caches, Schedulers and Beyond!
Gururaj Saileshwar
The Robustness of Blockchains to Network Delays
Suryanarayana Sankagiri
Towards Verified Trusted Computing Platforms with UCLID5
Sanjit A. Seshia
Differentially Private Community Detection over Stochastic Block Models
Ravi Tandon
zkSaaS: Zero-Knowledge SNARKs as a Service
Sruthi Sekar
Batch Proofs are Statistically Hiding
Chethan Kamath
Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer
Arpita Patra
Layered MPC
Varun Narayanan
Incompressible Encryption
Mahesh Sreekumar Rajasree
Trustworthiness of Systems
Sundeep Oberoi
Artificial Intelligence: The path towards responsible governance
Cristina Vanberghen
Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications
Arpita Patra
Geometry of Secure Computation
Hemanta Maji
End-to-End Secure Messaging with Traceability Only for Illegal Content
Guru Vamsi Policharla
Errors and Correction in Cumulative Knowledge
Madhu Sudan
Time-Space Tradeoffs for Collisions in Hash Functions
Akshima
Open and Permissionless Blockchains - A Swiss Perspective
Felix Härer
Composing High-Assurance Software
Natarajan Shankar
End-to-End Security for Evolved Computer Systems
Earlence Fernandes
A Conversation on the Draft Digital Personal Data Protection Bill 2022
Apar Gupta
Software needs Watchdogs
Tom Henzinger
A Systems Security Perspective on Building Secure and Reliable Deep Learning Systems
Sanghyun Hong
SCALES: MPC with Small Clients and Large Ephemeral Servers
Anasuya Acharya
Privacy Preserving Collaborations: DPFs to the rescue
Adithya Vadapalli
A Conversation on the Draft Indian Telecommunication Bill 2022
Debayan Gupta
Biometrics: When Technology Meets the Real-World
Arun Ross
Twitter Facebook-f Linkedin Youtube
  • trustlabcse.iitb.ac.in
  • +91-22-2159-6725
  • First Floor, New CSE Building
    Department of Computer Science and Engineering,
    Indian Institute of Technology Bombay,
    Powai, Mumbai 400076
IITB logo