What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Divya Gupta
Google Scholar
34
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
Communication Efficient Secure and Private Multi-Party Deep Learning.
Sankha Das
Sayak Ray Chowdhury
Nishanth Chandran
Divya Gupta
Satya Lokam
Rahul Sharma
2025
conf/sp
SHARK: Actively Secure Inference Using Function Secret Sharing.
Kanav Gupta
Nishanth Chandran
Divya Gupta
Jonathan Katz
Rahul Sharma
2024
journals/popets
SIGMA: Secure GPT Inference with Function Secret Sharing.
Kanav Gupta
Neha Jawalkar
Ananta Mukherjee
Nishanth Chandran
Divya Gupta
Ashish Panwar
Rahul Sharma
2024
conf/ccs
Securely Training Decision Trees Efficiently.
Divyanshu Bhardwaj
Sandhya Saravanan
Nishanth Chandran
Divya Gupta
2024
conf/ccs
Secure Sorting and Selection via Function Secret Sharing.
Amit Agarwal
Elette Boyle
Nishanth Chandran
Niv Gilboa
Divya Gupta
Yuval Ishai
Mahimna Kelkar
Yiping Ma
2024
conf/sp
Orca: FSS-based Secure Training and Inference with GPUs.
Neha Jawalkar
Kanav Gupta
Arkaprava Basu
Nishanth Chandran
Divya Gupta
Rahul Sharma
2023
journals/popets
End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets.
Gauri Gupta
Krithika Ramesh
Anwesh Bhattacharya
Divya Gupta
Rahul Sharma
Nishanth Chandran
Rijurekha Sen
2023
conf/uss
Secure Floating-Point Training.
Deevashwer Rathee
Anwesh Bhattacharya
Divya Gupta
Rahul Sharma
Dawn Song
2022
journals/popets
LLAMA: A Low Latency Math Library for Secure Inference.
Kanav Gupta
Deepak Kumaraswamy
Nishanth Chandran
Divya Gupta
2022
journals/popets
Circuit-PSI With Linear Complexity via Relaxed Batch OPPRF.
Nishanth Chandran
Divya Gupta
Akash Shah
2022
conf/uss
SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost.
Nishanth Chandran
Divya Gupta
Sai Lakshmi Bhavana Obbattu
Akash Shah
2022
conf/sp
SecFloat: Accurate Floating-Point meets Secure 2-Party Computation.
Deevashwer Rathee
Anwesh Bhattacharya
Rahul Sharma
Divya Gupta
Nishanth Chandran
Aseem Rastogi
2021
conf/ccs
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI.
Nishanth Chandran
Nishka Dasgupta
Divya Gupta
Sai Lakshmi Bhavana Obbattu
Sruthi Sekar
Akash Shah
2021
conf/sp
SiRnn: A Math Library for Secure RNN Inference.
Deevashwer Rathee
Mayank Rathee
Rahul Kranti Kiran Goli
Divya Gupta
Rahul Sharma
Nishanth Chandran
Aseem Rastogi
2021
conf/ccsw-ws
Secure Featurization and Applications to Secure Phishing Detection.
Akash Shah
Nishanth Chandran
Mesfin Dema
Divya Gupta
Arun Gururajan
Huan Yu
2021
conf/eurocrypt
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.
Elette Boyle
Nishanth Chandran
Niv Gilboa
Divya Gupta
Yuval Ishai
Nishant Kumar
Mayank Rathee
2020
conf/ccs
CrypTFlow2: Practical 2-Party Secure Inference.
Deevashwer Rathee
Mayank Rathee
Nishant Kumar
Nishanth Chandran
Divya Gupta
Aseem Rastogi
Rahul Sharma
2020
conf/sp
CrypTFlow: Secure TensorFlow Inference.
Nishant Kumar
Mayank Rathee
Nishanth Chandran
Divya Gupta
Aseem Rastogi
Rahul Sharma
2019
journals/popets
SecureNN: 3-Party Secure Computation for Neural Network Training.
Sameer Wagh
Divya Gupta
Nishanth Chandran
2019
conf/crypto
Explicit Rate-1 Non-malleable Codes for Local Tampering.
Divya Gupta
Hemanta K. Maji
Mingyuan Wang
2019
conf/eurosp
EzPC: Programmable and Efficient Secure Two-Party Computation for Machine Learning.
Nishanth Chandran
Divya Gupta
Aseem Rastogi
Rahul Sharma
Shardul Tripathi
2018
conf/tcc
Secure Computation Using Leaky Correlations (Asymptotically Optimal Constructions).
Alexander R. Block
Divya Gupta
Hemanta K. Maji
Hai H. Nguyen
2017
conf/crypto
Laconic Oblivious Transfer and Its Applications.
Chongwon Cho
Nico Döttling
Sanjam Garg
Divya Gupta
Peihan Miao
Antigoni Polychroniadou
2016
conf/tcc
Secure Multiparty RAM Computation in Constant Rounds.
Sanjam Garg
Divya Gupta
Peihan Miao
Omkant Pandey
2016
conf/tcc
Optimal Computational Split-state Non-malleable Codes.
Divesh Aggarwal
Shashank Agrawal
Divya Gupta
Hemanta K. Maji
Omkant Pandey
Manoj Prabhakaran
2015
conf/crypto
Secure Computation from Leaky Correlated Randomness.
Divya Gupta
Yuval Ishai
Hemanta K. Maji
Amit Sahai
2015
conf/crypto
Concurrent Secure Computation via Non-Black Box Simulation.
Vipul Goyal
Divya Gupta
Amit Sahai
2015
conf/crypto
Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations.
Shashank Agrawal
Divya Gupta
Hemanta K. Maji
Omkant Pandey
Manoj Prabhakaran
2015
conf/eurocrypt
Hosting Services on an Untrusted Cloud.
Dan Boneh
Divya Gupta
Ilya Mironov
Amit Sahai
2015
conf/asiacrypt
Multi-input Functional Encryption for Unbounded Arity Functions.
Saikrishna Badrinarayanan
Divya Gupta
Abhishek Jain
Amit Sahai
2015
conf/tcc
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations.
Shashank Agrawal
Divya Gupta
Hemanta K. Maji
Omkant Pandey
Manoj Prabhakaran
2014
conf/ccs
Optimizing Obfuscation: Avoiding Barrington's Theorem.
Prabhanjan Vijendra Ananth
Divya Gupta
Yuval Ishai
Amit Sahai
2014
conf/eurocrypt
Efficient Round Optimal Blind Signatures.
Sanjam Garg
Divya Gupta
2013
conf/crypto
What Information Is Leaked under Concurrent Composition?
Vipul Goyal
Divya Gupta
Abhishek Jain
Coauthors
Abhishek Jain
(2)
Akash Shah
(4)
Alexander R. Block
(1)
Amit Agarwal
(1)
Amit Sahai
(5)
Ananta Mukherjee
(1)
Antigoni Polychroniadou
(1)
Anwesh Bhattacharya
(3)
Arkaprava Basu
(1)
Arun Gururajan
(1)
Aseem Rastogi
(5)
Ashish Panwar
(1)
Chongwon Cho
(1)
Dan Boneh
(1)
Dawn Song
(1)
Deepak Kumaraswamy
(1)
Deevashwer Rathee
(4)
Divesh Aggarwal
(1)
Divya Gupta
(34)
Divyanshu Bhardwaj
(1)
Elette Boyle
(2)
Gauri Gupta
(1)
Hai H. Nguyen
(1)
Hemanta K. Maji
(6)
Huan Yu
(1)
Ilya Mironov
(1)
Jonathan Katz
(1)
Kanav Gupta
(4)
Krithika Ramesh
(1)
Mahimna Kelkar
(1)
Manoj Prabhakaran
(3)
Mayank Rathee
(4)
Mesfin Dema
(1)
Mingyuan Wang
(1)
Neha Jawalkar
(2)
Nico Döttling
(1)
Nishant Kumar
(3)
Nishanth Chandran
(19)
Nishka Dasgupta
(1)
Niv Gilboa
(2)
Omkant Pandey
(4)
Peihan Miao
(2)
Prabhanjan Vijendra Ananth
(1)
Rahul Kranti Kiran Goli
(1)
Rahul Sharma
(11)
Rijurekha Sen
(1)
Sai Lakshmi Bhavana Obbattu
(2)
Saikrishna Badrinarayanan
(1)
Sameer Wagh
(1)
Sandhya Saravanan
(1)
Sanjam Garg
(3)
Sankha Das
(1)
Satya Lokam
(1)
Sayak Ray Chowdhury
(1)
Shardul Tripathi
(1)
Shashank Agrawal
(3)
Sruthi Sekar
(1)
Vipul Goyal
(2)
Yiping Ma
(1)
Yuval Ishai
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to