What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Nishanth Chandran
Google Scholar
37
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
Communication Efficient Secure and Private Multi-Party Deep Learning.
Sankha Das
Sayak Ray Chowdhury
Nishanth Chandran
Divya Gupta
Satya Lokam
Rahul Sharma
2025
conf/sp
SHARK: Actively Secure Inference Using Function Secret Sharing.
Kanav Gupta
Nishanth Chandran
Divya Gupta
Jonathan Katz
Rahul Sharma
2024
journals/popets
SIGMA: Secure GPT Inference with Function Secret Sharing.
Kanav Gupta
Neha Jawalkar
Ananta Mukherjee
Nishanth Chandran
Divya Gupta
Ashish Panwar
Rahul Sharma
2024
conf/ccs
Securely Training Decision Trees Efficiently.
Divyanshu Bhardwaj
Sandhya Saravanan
Nishanth Chandran
Divya Gupta
2024
conf/ccs
Secure Sorting and Selection via Function Secret Sharing.
Amit Agarwal
Elette Boyle
Nishanth Chandran
Niv Gilboa
Divya Gupta
Yuval Ishai
Mahimna Kelkar
Yiping Ma
2024
conf/sp
Orca: FSS-based Secure Training and Inference with GPUs.
Neha Jawalkar
Kanav Gupta
Arkaprava Basu
Nishanth Chandran
Divya Gupta
Rahul Sharma
2024
conf/tcc
Adaptive Security, Erasures, and Network Assumptions in Communication-Local MPC.
Nishanth Chandran
Juan A. Garay
Ankit Kumar Misra
Rafail Ostrovsky
Vassilis Zikas
2023
journals/popets
End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets.
Gauri Gupta
Krithika Ramesh
Anwesh Bhattacharya
Divya Gupta
Rahul Sharma
Nishanth Chandran
Rijurekha Sen
2023
conf/iciss
Security and Privacy in Machine Learning.
Nishanth Chandran
2022
journals/popets
LLAMA: A Low Latency Math Library for Secure Inference.
Kanav Gupta
Deepak Kumaraswamy
Nishanth Chandran
Divya Gupta
2022
journals/popets
Circuit-PSI With Linear Complexity via Relaxed Batch OPPRF.
Nishanth Chandran
Divya Gupta
Akash Shah
2022
conf/uss
SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost.
Nishanth Chandran
Divya Gupta
Sai Lakshmi Bhavana Obbattu
Akash Shah
2022
conf/crypto
Short Leakage Resilient and Non-malleable Secret Sharing Schemes.
Nishanth Chandran
Bhavana Kanukurthi
Sai Lakshmi Bhavana Obbattu
Sruthi Sekar
2022
conf/sp
SecFloat: Accurate Floating-Point meets Secure 2-Party Computation.
Deevashwer Rathee
Anwesh Bhattacharya
Rahul Sharma
Divya Gupta
Nishanth Chandran
Aseem Rastogi
2021
conf/ccs
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI.
Nishanth Chandran
Nishka Dasgupta
Divya Gupta
Sai Lakshmi Bhavana Obbattu
Sruthi Sekar
Akash Shah
2021
conf/crypto
Adaptive Extractors and Their Application to Leakage Resilient Secret Sharing.
Nishanth Chandran
Bhavana Kanukurthi
Sai Lakshmi Bhavana Obbattu
Sruthi Sekar
2021
conf/sp
SiRnn: A Math Library for Secure RNN Inference.
Deevashwer Rathee
Mayank Rathee
Rahul Kranti Kiran Goli
Divya Gupta
Rahul Sharma
Nishanth Chandran
Aseem Rastogi
2021
conf/ccsw-ws
Secure Featurization and Applications to Secure Phishing Detection.
Akash Shah
Nishanth Chandran
Mesfin Dema
Divya Gupta
Arun Gururajan
Huan Yu
2021
conf/eurocrypt
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.
Elette Boyle
Nishanth Chandran
Niv Gilboa
Divya Gupta
Yuval Ishai
Nishant Kumar
Mayank Rathee
2020
conf/ccs
CrypTFlow2: Practical 2-Party Secure Inference.
Deevashwer Rathee
Mayank Rathee
Nishant Kumar
Nishanth Chandran
Divya Gupta
Aseem Rastogi
Rahul Sharma
2020
conf/sp
CrypTFlow: Secure TensorFlow Inference.
Nishant Kumar
Mayank Rathee
Nishanth Chandran
Divya Gupta
Aseem Rastogi
Rahul Sharma
2019
journals/popets
SecureNN: 3-Party Secure Computation for Neural Network Training.
Sameer Wagh
Divya Gupta
Nishanth Chandran
2019
conf/crypto
Universally Composable Secure Computation with Corrupted Tokens.
Nishanth Chandran
Wutichai Chongchitmate
Rafail Ostrovsky
Ivan Visconti
2019
conf/eurosp
EzPC: Programmable and Efficient Secure Two-Party Computation for Machine Learning.
Nishanth Chandran
Divya Gupta
Aseem Rastogi
Rahul Sharma
Shardul Tripathi
2017
conf/ccs
Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case.
Nishanth Chandran
Juan A. Garay
Payman Mohassel
Satyanarayana Vusirikala
2017
conf/ndss
HOP: Hardware makes Obfuscation Practical.
Kartik Nayak
Christopher W. Fletcher
Ling Ren
Nishanth Chandran
Satya V. Lokam
Elaine Shi
Vipul Goyal
2016
conf/pkc
Reducing Depth in Constrained PRFs: From Bit-Fixing to \mathbf NC^1.
Nishanth Chandran
Srinivasan Raghuraman
Dhinakaran Vinayagamurthy
2016
conf/tcc
Information-Theoretic Local Non-malleable Codes and Their Applications.
Nishanth Chandran
Bhavana Kanukurthi
Srinivasan Raghuraman
2015
journals/joc
Almost-Everywhere Secure Computation with Edge Corruptions.
Nishanth Chandran
Juan A. Garay
Rafail Ostrovsky
2014
conf/pkc
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices.
Nishanth Chandran
Melissa Chase
Feng-Hao Liu
Ryo Nishimaki
Keita Xagawa
2014
conf/pkc
Achieving Privacy in Verifiable Computation with Multiple Servers - Without FHE and without Pre-processing.
Prabhanjan Ananth
Nishanth Chandran
Vipul Goyal
Bhavana Kanukurthi
Rafail Ostrovsky
2014
conf/tcc
Locally Updatable and Locally Decodable Codes.
Nishanth Chandran
Bhavana Kanukurthi
Rafail Ostrovsky
2012
conf/tcc
Functional Re-encryption and Collusion-Resistant Obfuscation.
Nishanth Chandran
Melissa Chase
Vinod Vaikuntanathan
2011
conf/crypto
Position-Based Quantum Cryptography: Impossibility and Constructions.
Harry Buhrman
Nishanth Chandran
Serge Fehr
Ran Gelles
Vipul Goyal
Rafail Ostrovsky
Christian Schaffner
2009
conf/crypto
Position Based Cryptography.
Nishanth Chandran
Vipul Goyal
Ryan Moriarty
Rafail Ostrovsky
2009
conf/eurocrypt
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks.
Jan Camenisch
Nishanth Chandran
Victor Shoup
2008
conf/eurocrypt
New Constructions for UC Secure Computation Using Tamper-Proof Hardware.
Nishanth Chandran
Vipul Goyal
Amit Sahai
Coauthors
Akash Shah
(4)
Amit Agarwal
(1)
Amit Sahai
(1)
Ananta Mukherjee
(1)
Ankit Kumar Misra
(1)
Anwesh Bhattacharya
(2)
Arkaprava Basu
(1)
Arun Gururajan
(1)
Aseem Rastogi
(5)
Ashish Panwar
(1)
Bhavana Kanukurthi
(5)
Christian Schaffner
(1)
Christopher W. Fletcher
(1)
Deepak Kumaraswamy
(1)
Deevashwer Rathee
(3)
Dhinakaran Vinayagamurthy
(1)
Divya Gupta
(19)
Divyanshu Bhardwaj
(1)
Elaine Shi
(1)
Elette Boyle
(2)
Feng-Hao Liu
(1)
Gauri Gupta
(1)
Harry Buhrman
(1)
Huan Yu
(1)
Ivan Visconti
(1)
Jan Camenisch
(1)
Jonathan Katz
(1)
Juan A. Garay
(3)
Kanav Gupta
(4)
Kartik Nayak
(1)
Keita Xagawa
(1)
Krithika Ramesh
(1)
Ling Ren
(1)
Mahimna Kelkar
(1)
Mayank Rathee
(4)
Melissa Chase
(2)
Mesfin Dema
(1)
Neha Jawalkar
(2)
Nishant Kumar
(3)
Nishanth Chandran
(37)
Nishka Dasgupta
(1)
Niv Gilboa
(2)
Payman Mohassel
(1)
Prabhanjan Ananth
(1)
Rafail Ostrovsky
(7)
Rahul Kranti Kiran Goli
(1)
Rahul Sharma
(10)
Ran Gelles
(1)
Rijurekha Sen
(1)
Ryan Moriarty
(1)
Ryo Nishimaki
(1)
Sai Lakshmi Bhavana Obbattu
(4)
Sameer Wagh
(1)
Sandhya Saravanan
(1)
Sankha Das
(1)
Satya Lokam
(1)
Satya V. Lokam
(1)
Satyanarayana Vusirikala
(1)
Sayak Ray Chowdhury
(1)
Serge Fehr
(1)
Shardul Tripathi
(1)
Srinivasan Raghuraman
(2)
Sruthi Sekar
(3)
Vassilis Zikas
(1)
Victor Shoup
(1)
Vinod Vaikuntanathan
(1)
Vipul Goyal
(5)
Wutichai Chongchitmate
(1)
Yiping Ma
(1)
Yuval Ishai
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to