Nishanth Chandran
Orcid: 0000-0002-8528-9768
According to our database1,
Nishanth Chandran
authored at least 74 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the IEEE Symposium on Security and Privacy, 2025
2024
IACR Cryptol. ePrint Arch., 2024
Private Benchmarking to Prevent Contamination and Improve Comparative Evaluation of LLMs.
CoRR, 2024
CoRR, 2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Information Systems Security - 19th International Conference, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the COMPASS '22: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, Seattle, WA, USA, 29 June 2022, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022
2021
IACR Cryptol. ePrint Arch., 2021
CoRR, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Constant Rate (Non-malleable) Secret Sharing Schemes Tolerating Joint Adaptive Leakage.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
Proc. Priv. Enhancing Technol., 2019
Proceedings of the IEEE European Symposium on Security and Privacy, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
IACR Cryptol. ePrint Arch., 2018
2017
IACR Cryptol. ePrint Arch., 2017
Universally Composable Secure Two and Multi-party Computation in the Corruptible Tamper-Proof Hardware Token Model.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Proceedings of the Theory of Cryptography - 13th International Conference, 2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults.
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Achieving Privacy in Verifiable Computation with Multiple Servers - Without FHE and without Pre-processing.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Proceedings of the Automata, Languages, and Programming - 39th International Colloquium, 2012
2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
2010
Proceedings of the 42nd ACM Symposium on Theory of Computing, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the Automata, Languages and Programming, 37th International Colloquium, 2010
2009
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks.
Proceedings of the Advances in Cryptology, 2009
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009
2008
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007
Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, 2007
2006
Electron. Colloquium Comput. Complex., 2006