Follow
Amrit Kumar
Amrit Kumar
Research Fellow, National University of Singapore
Verified email at inria.fr - Homepage
Title
Cited by
Cited by
Year
A Traceability Analysis of Monero's Blockchain
A Kumar, C Fischer, S Tople, P Saxena
European Symposium on Research in Computer Security (ESORICS), 2017
1832017
Scilla: a Smart Contract Intermediate-Level LAnguage
I Sergey, A Kumar, A Hobor
arXiv preprint arXiv:1801.00687, 2018
992018
Safer smart contract programming with Scilla
I Sergey, V Nagaraj, J Johannsen, A Kumar, A Trunov, KCG Hao
Proceedings of the ACM on Programming Languages 3 (OOPSLA), 1-30, 2019
802019
The Power of Evil Choices in Bloom Filters
T Gerbet, A Kumar, C Lauradoux
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2015
402015
Temporal Properties of Smart Contracts
I Sergey, A Kumar, A Hobor
International Symposium on Leveraging Applications of Formal Methods, 323-338, 2018
312018
The pitfalls of hashing for privacy
L Demir, A Kumar, M Cunche, C Lauradoux
IEEE Communications Surveys & Tutorials 20 (1), 551-565, 2017
252017
A Privacy Analysis of Google and Yandex Safe Browsing
T Gerbet, A Kumar, C Lauradoux
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016
192016
Practical smart contract sharding with ownership and commutativity analysis
G Pîrlea, A Kumar, I Sergey
Proceedings of the 42nd ACM SIGPLAN International Conference on Programming …, 2021
162021
Performances of Cryptographic Accumulators
A Kumar, P Lafourcade, C Lauradoux
IEEE Conference on Local Computer Networks (LCN), 2014
132014
Scilla: a smart contract intermediate-level language. CoRR abs/1801.00687 (2018)
I Sergey, A Kumar, A Hobor
arXiv preprint arXiv:1801.00687, 2018
82018
The power of evil choices in bloom filters
T Gerbet, A Kumar, C Lauradoux
INRIA Grenoble, 2014
72014
Scilla: a smart contract intermediate-level language (2018)
I Sergey, A Kumar, A Hobor
arXiv preprint arXiv:1801.00687, 1801
71801
A privacy analysis of google and yandex safe browsing
T Gerbet, A Kumar, C Lauradoux
INRIA, 2015
52015
Decompression Quines and Anti-Viruses
M Canet, A Kumar, C Lauradoux, MA Rakotomanga, R Safavi-Naini
ACM Conference on Data and Applications Security and Privacy (CODASPY), 2017
22017
Security and Privacy of Hash-Based Software Applications
A Kumar
Université Grenoble Alpes, 2016
22016
(Un) Safe Browsing
T Gerbet, A Kumar, C Lauradoux
INRIA, 2014
22014
Algorithm-Based Secure and Fault Tolerant Outsourcing of Matrix Computations
A Kumar, JL Roch
2*2013
Security and privacy for outsourced computations.
A Kumar
Université Grenoble Alpes, 2016
12016
Proofs as Cryptography: a new interpretation of the Curry-Howard isomorphism for software certificates
A Kumar, PA Fouque, T Genet, M Tibouchi
12012
Analyzing Security-Cost Trade-off for a Fully Homomorphic Encryption Scheme
K Chaabouni, A Kumar
K. Chaabouni and A. Kumar. Analyzing security-cost trade-off for a fully …, 0
1
The system can't perform the operation now. Try again later.
Articles 1–20