Nishanth Chandran

Orcid: 0000-0002-8528-9768

According to our database1, Nishanth Chandran authored at least 74 papers between 2006 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Enterprise AI Must Enforce Participant-Aware Access Control.
CoRR, September, 2025

Matchmaker: Fast Secure Inference across Deployment Scenarios.
IACR Cryptol. ePrint Arch., 2025

SHARK: Actively Secure Inference Using Function Secret Sharing.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

2024
Communication Efficient Secure and Private Multi-Party Deep Learning.
IACR Cryptol. ePrint Arch., 2024

Private Benchmarking to Prevent Contamination and Improve Comparative Evaluation of LLMs.
CoRR, 2024

TrustRate: A Decentralized Platform for Hijack-Resistant Anonymous Reviews.
CoRR, 2024

Adaptive Security, Erasures, and Network Assumptions in Communication-Local MPC.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Orca: FSS-based Secure Training and Inference with GPUs.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Securely Training Decision Trees Efficiently.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Secure Sorting and Selection via Function Secret Sharing.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Orca: FSS-based Secure Training with GPUs.
IACR Cryptol. ePrint Arch., 2023

End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets.
IACR Cryptol. ePrint Arch., 2023

SIGMA: Secure GPT Inference with Function Secret Sharing.
IACR Cryptol. ePrint Arch., 2023

Privacy Preserving Multi-Agent Reinforcement Learning in Supply Chains.
CoRR, 2023

Security and Privacy in Machine Learning.
Proceedings of the Information Systems Security - 19th International Conference, 2023

2022
LLAMA: A Low Latency Math Library for Secure Inference.
IACR Cryptol. ePrint Arch., 2022

Efficient ML Models for Practical Secure Inference.
CoRR, 2022

SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost.
Proceedings of the 31st USENIX Security Symposium, 2022

SecFloat: Accurate Floating-Point meets Secure 2-Party Computation.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Telechain: Bridging Telecom Policy and Blockchain Practice.
Proceedings of the COMPASS '22: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, Seattle, WA, USA, 29 June 2022, 2022

Short Leakage Resilient and Non-malleable Secret Sharing Schemes.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Universally Composable Almost-Everywhere Secure Computation.
Proceedings of the 3rd Conference on Information-Theoretic Cryptography, 2022

2021
SIRNN: A Math Library for Secure RNN Inference.
IACR Cryptol. ePrint Arch., 2021

Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF.
IACR Cryptol. ePrint Arch., 2021

Production-level Open Source Privacy Preserving Inference in Medical Imaging.
CoRR, 2021

SiRnn: A Math Library for Secure RNN Inference.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Adaptive Extractors and Their Application to Leakage Resilient Secret Sharing.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Secure Featurization and Applications to Secure Phishing Detection.
Proceedings of the CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, 2021

Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Constant Rate (Non-malleable) Secret Sharing Schemes Tolerating Joint Adaptive Leakage.
IACR Cryptol. ePrint Arch., 2020

Secure Medical Image Analysis with CrypTFlow.
CoRR, 2020

CrypTFlow: Secure TensorFlow Inference.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Blockene: A High-throughput Blockchain Over Mobile Devices.
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020

CrypTFlow2: Practical 2-Party Secure Inference.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
SecureNN: 3-Party Secure Computation for Neural Network Training.
Proc. Priv. Enhancing Technol., 2019

EzPC: Programmable and Efficient Secure Two-Party Computation for Machine Learning.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Universally Composable Secure Computation with Corrupted Tokens.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
SecureNN: Efficient and Private Neural Network Training.
IACR Cryptol. ePrint Arch., 2018

2017
EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation.
IACR Cryptol. ePrint Arch., 2017

Universally Composable Secure Two and Multi-party Computation in the Corruptible Tamper-Proof Hardware Token Model.
IACR Cryptol. ePrint Arch., 2017

HOP: Hardware makes Obfuscation Practical.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Hierarchical Functional Encryption.
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017

Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Information-Theoretic Local Non-malleable Codes and Their Applications.
Proceedings of the Theory of Cryptography - 13th International Conference, 2016

Reducing Depth in Constrained PRFs: From Bit-Fixing to \mathbf NC^1.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Big Data Analytics over Encrypted Datasets with Seabed.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016

Block-Wise Non-Malleable Codes.
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016

2015
Reducing Multilinear Map Levels in Constrained PRFs and ABE.
IACR Cryptol. ePrint Arch., 2015

Functional Encryption: Decentralised and Delegatable.
IACR Cryptol. ePrint Arch., 2015

The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults.
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015

2014
Constrained Pseudorandom Functions: Verifiable and Delegatable.
IACR Cryptol. ePrint Arch., 2014

Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality.
IACR Cryptol. ePrint Arch., 2014

Locally Updatable and Locally Decodable Codes.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Achieving Privacy in Verifiable Computation with Multiple Servers - Without FHE and without Pre-processing.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

2012
Almost-Everywhere Secure Computation with Edge Corruptions.
IACR Cryptol. ePrint Arch., 2012

Hardness Preserving Constructions of Pseudorandom Functions, Revisited.
IACR Cryptol. ePrint Arch., 2012

Functional Re-encryption and Collusion-Resistant Obfuscation.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Edge Fault Tolerance on Sparse Networks.
Proceedings of the Automata, Languages, and Programming - 39th International Colloquium, 2012

2011
Collusion Resistant Obfuscation and Functional Re-encryption.
IACR Cryptol. ePrint Arch., 2011

Position-Based Quantum Cryptography: Impossibility and Constructions.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2010
Privacy amplification with asymptotically optimal entropy loss.
Proceedings of the 42nd ACM Symposium on Theory of Computing, 2010

Public-Key Encryption with Efficient Amortized Updates.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

Improved Fault Tolerance and Secure Computation on Sparse Networks.
Proceedings of the Automata, Languages and Programming, 37th International Colloquium, 2010

2009
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks.
Proceedings of the Advances in Cryptology, 2009

A Secure Cryptographic Token Interface.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

Position Based Cryptography.
Proceedings of the Advances in Cryptology, 2009

2008
Improved algorithms for optimal embeddings.
ACM Trans. Algorithms, 2008

New Constructions for UC Secure Computation Using Tamper-Proof Hardware.
Proceedings of the Advances in Cryptology, 2008

2007
Ring Signatures of Sub-linear Size Without Random Oracles.
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007

Covert Multi-Party Computation.
Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science, 2007

2006
Improved Algorithms for Optimal Embeddings.
Electron. Colloquium Comput. Complex., 2006


  Loading...