Akshay Wadia

Learn More
A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the problem of software protection via oblivious RAM. Goldwasser, Kalai, and Rothblum introduced the concept of one-time programs: in a one-time program, an honest sender sends a set(More)
The antiapoptotic and neuroprotective activity of irreversible monoamine oxidase (MAO) B inhibitor, rasagiline [R(+)-N-propargyl-1-aminioindan], its S-isomer (TVP1022) and TV 3219, a novel anti-Alzheimer cholinesterase-MAO inhibitor drug derived from rasagiline were examined in PC12 cells cultures and in vivo. We found that these drugs have potent(More)
Physically Uncloneable Functions (PUFs) [28] are noisy physical sources of randomness. As such, they are naturally appealing for cryptographic applications, and have caught the interest of both theoreticians and practitioners. A major step towards understanding and securely using PUFs was recently taken in [Crypto 2011] where Brzuska, Fischlin, Schröder and(More)
Most entropy notions $${H(.)}$$ H ( . ) like Shannon or min-entropy satisfy a chain rule stating that for random variables $${X,Z,}$$ X , Z , and $${A}$$ A we have $${H(X|Z,A)\ge H(X|Z)-|A|}$$ H ( X | Z , A ) ≥ H ( X | Z ) - | A | . That is, by conditioning on $${A}$$ A the entropy of $${X}$$ X can decrease by at most the bitlength $${|A|}$$ | A | of(More)
The development of high-throughput genomic technologies has impacted many areas of genetic research. While many applications of these technologies focus on the discovery of genes involved in disease from population samples, applications of genomic technologies to an individual's genome or personal genomics have recently gained much interest. One such(More)
MOTIVATION High-throughput sequencing technologies have impacted many areas of genetic research. One such area is the identification of relatives from genetic data. The standard approach for the identification of genetic relatives collects the genomic data of all individuals and stores it in a database. Then, each pair of individuals is compared to detect(More)
Consider two parties Alice and Bob, who hold private inputs <i>x</i> and <i>y</i>, and wish to compute a function <i>f(x, y)</i> <i>privately</i> in the information theoretic sense; that is, each party should learn nothing beyond <i>f(x, y)</i>. However, the communication channel available to them is <i>noisy</i>. This means that the channel can introduce(More)
A Captcha is a puzzle that is easy for humans but hard to solve for computers. A formal framework, modelling Captcha puzzles (as hard AI problems), was introduced by Ahn, Blum, Hopper, and Langford ([ABHL03], Eurocrypt 2003). Despite their attractive features and wide adoption in practice, the use of Captcha puzzles for general cryptographic applications(More)