Follow
Amrit Kumar
Amrit Kumar
Research Fellow, National University of Singapore
Verified email at inria.fr - Homepage
Title
Cited by
Cited by
Year
A Traceability Analysis of Monero's Blockchain
A Kumar, C Fischer, S Tople, P Saxena
European Symposium on Research in Computer Security (ESORICS), 2017
2452017
Scilla: a Smart Contract Intermediate-Level LAnguage
I Sergey, A Kumar, A Hobor
arXiv preprint arXiv:1801.00687, 2018
1232018
Safer smart contract programming with Scilla
I Sergey, V Nagaraj, J Johannsen, A Kumar, A Trunov, KCG Hao
Proceedings of the ACM on Programming Languages 3 (OOPSLA), 1-30, 2019
1182019
Practical smart contract sharding with ownership and commutativity analysis
G Pîrlea, A Kumar, I Sergey
Proceedings of the 42nd ACM SIGPLAN International Conference on Programming …, 2021
472021
The Power of Evil Choices in Bloom Filters
T Gerbet, A Kumar, C Lauradoux
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2015
472015
Temporal Properties of Smart Contracts
I Sergey, A Kumar, A Hobor
International Symposium on Leveraging Applications of Formal Methods, 323-338, 2018
392018
The pitfalls of hashing for privacy
L Demir, A Kumar, M Cunche, C Lauradoux
IEEE Communications Surveys & Tutorials 20 (1), 551-565, 2017
382017
Performances of Cryptographic Accumulators
A Kumar, P Lafourcade, C Lauradoux
IEEE Conference on Local Computer Networks (LCN), 2014
232014
A Privacy Analysis of Google and Yandex Safe Browsing
T Gerbet, A Kumar, C Lauradoux
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2016
222016
Scilla: a smart contract intermediate-level language. CoRR abs/1801.00687 (2018)
I Sergey, A Kumar, A Hobor
arXiv preprint arXiv:1801.00687, 2018
82018
The power of evil choices in bloom filters
T Gerbet, A Kumar, C Lauradoux
INRIA Grenoble, 2014
82014
Scilla: a smart contract intermediate-level language (2018)
I Sergey, A Kumar, A Hobor
arXiv preprint arXiv:1801.00687, 1801
81801
A privacy analysis of google and yandex safe browsing
T Gerbet, A Kumar, C Lauradoux
INRIA, 2015
52015
Decompression Quines and Anti-Viruses
M Canet, A Kumar, C Lauradoux, MA Rakotomanga, R Safavi-Naini
ACM Conference on Data and Applications Security and Privacy (CODASPY), 2017
42017
Security and Privacy of Hash-Based Software Applications
A Kumar
Université Grenoble Alpes, 2016
32016
(Un) Safe Browsing
T Gerbet, A Kumar, C Lauradoux
INRIA, 2014
22014
Algorithm-Based Secure and Fault Tolerant Outsourcing of Matrix Computations
A Kumar, JL Roch
2*2013
Proofs as Cryptography: a new interpretation of the Curry-Howard isomorphism for software certificates
A Kumar, PA Fouque, T Genet, M Tibouchi
22012
Compiling a Higher-Order Smart Contract Language to LLVM
V Nagaraj, J Johannsen, A Trunov, G Pîrlea, A Kumar, I Sergey
arXiv preprint arXiv:2008.05555, 2020
12020
Security and privacy for outsourced computations.
A Kumar
Université Grenoble Alpes, 2016
12016
The system can't perform the operation now. Try again later.
Articles 1–20