#### Filter Results:

- Full text PDF available (10)

#### Publication Year

1975

2016

#### Publication Type

#### Co-author

#### Publication Venue

#### Key Phrases

Learn More

- M B Youdim, A Wadia, W Tatton, M Weinstock
- Annals of the New York Academy of Sciences
- 2001

The antiapoptotic and neuroprotective activity of irreversible monoamine oxidase (MAO) B inhibitor, rasagiline [R(+)-N-propargyl-1-aminioindan], its S-isomer (TVP1022) and TV 3219, a novel anti-Alzheimer cholinesterase-MAO inhibitor drug derived from rasagiline were examined in PC12 cells cultures and in vivo. We found that these drugs have potent… (More)

A number of works have investigated using tamper-proof hardware tokens as tools to achieve a variety of cryptographic tasks. In particular, Goldreich and Ostrovsky considered the problem of software protection via oblivious RAM. Goldwasser, Kalai, and Rothblum introduced the concept of one-time programs: in a one-time program, an honest sender sends a set… (More)

- Rafail Ostrovsky, Alessandra Scafuro, Ivan Visconti, Akshay Wadia
- EUROCRYPT
- 2012

Physically Uncloneable Functions (PUFs) [28] are noisy physical sources of randomness. As such, they are naturally appealing for cryptographic applications, and have caught the interest of both the-oreticians and practitioners. A major step towards understanding and securely using PUFs was recently taken in [Crypto 2011] where Brzuska, Fischlin, Schröder… (More)

- Dan He, Nicholas A Furlotte, +5 authors Eleazar Eskin
- Genome research
- 2014

The development of high-throughput genomic technologies has impacted many areas of genetic research. While many applications of these technologies focus on the discovery of genes involved in disease from population samples, applications of genomic technologies to an individual's genome or personal genomics have recently gained much interest. One such… (More)

- Stephan Krenn, Krzysztof Pietrzak, Akshay Wadia, Daniel Wichs
- computational complexity
- 2013

Most entropy notions $${H(.)}$$ H ( . ) like Shannon or min-entropy satisfy a chain rule stating that for random variables $${X,Z,}$$ X , Z , and $${A}$$ A we have $${H(X|Z,A)\ge H(X|Z)-|A|}$$ H ( X | Z , A ) ≥ H ( X | Z ) - | A | . That is, by conditioning on $${A}$$ A the entropy of $${X}$$ X can decrease by at most the bitlength $${|A|}$$ | A | of… (More)

- Sanjam Garg, Rafail Ostrovsky, Ivan Visconti, Akshay Wadia
- TCC
- 2011

Two central notions of Zero Knowledge that provide strong, yet seemingly incomparable security guarantees against malicious veri-fiers are those of Statistical Zero Knowledge and Resettable Zero Knowledge. The current state of the art includes several feasibility and impossibility results regarding these two notions separately. However, the question of… (More)

- Farhad Hormozdiari, Jong Wha J. Joo, +4 authors Eleazar Eskin
- Bioinformatics
- 2014

MOTIVATION
High-throughput sequencing technologies have impacted many areas of genetic research. One such area is the identification of relatives from genetic data. The standard approach for the identification of genetic relatives collects the genomic data of all individuals and stores it in a database. Then, each pair of individuals is compared to detect… (More)

- Ran Gelles, Amit Sahai, Akshay Wadia
- IEEE Transactions on Information Theory
- 2013

Consider two parties Alice and Bob, who hold private inputs <i>x</i> and <i>y</i>, and wish to compute a function <i>f(x, y)</i> <i>privately</i> in the information theoretic sense; that is, each party should learn nothing beyond <i>f(x, y)</i>. However, the communication channel available to them is <i>noisy</i>. This means that the channel can introduce… (More)

- Abishek Kumarasubramanian, Rafail Ostrovsky, Omkant Pandey, Akshay Wadia
- Public Key Cryptography
- 2012

A Captcha is a puzzle that is easy for humans but hard to solve for computers. A formal framework, modelling Captcha puzzles (as hard AI problems), was introduced by Ahn, Blum, Hopper, and Langford ([ABHL03], Eurocrypt 2003). Despite their attractive features and wide adoption in practice, the use of Captcha puzzles for general cryptographic applications… (More)

- Manoj Prabhakaran, Amit Sahai, Akshay Wadia
- ICALP
- 2014

Leakage-proof hardware tokens have been used to achieve a large number of cryptographic tasks recently. But in real life, due to various physical attacks, it is extremely difficult to construct hardware devices that are guaranteed to be leakage-proof. In this paper, we study the feasibility of general two-party computation using leaky hardware tokens. Our… (More)