Publications (Authors' names are in alphabetical order)
Zeroizing attacks against Evasive and Circular Evasive LWE
Shweta Agrawal, Anuja Modi, Anshu Yadav and Shota Yamada.
In Proceedings of the Theory of Cryptography Conference (TCC), 2025.Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions.
Shweta Agrawal, Fuyuki Kitagawa, Anuja Modi, Ryo Nishimaki, Shota Yamada and Takashi Yamakawa.
In Proceedings of the Theory of Cryptography Conference (TCC), 2022.