Nishanth Chandran

According to our database1, Nishanth Chandran authored at least 66 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Private Benchmarking to Prevent Contamination and Improve Comparative Evaluation of LLMs.
CoRR, 2024

TrustRate: A Decentralized Platform for Hijack-Resistant Anonymous Reviews.
CoRR, 2024

2023
End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets.
Proc. Priv. Enhancing Technol., October, 2023

Orca: FSS-based Secure Training with GPUs.
IACR Cryptol. ePrint Arch., 2023

SIGMA: Secure GPT Inference with Function Secret Sharing.
IACR Cryptol. ePrint Arch., 2023

Privacy Preserving Multi-Agent Reinforcement Learning in Supply Chains.
CoRR, 2023

Security and Privacy in Machine Learning.
Proceedings of the Information Systems Security - 19th International Conference, 2023

2022
LLAMA: A Low Latency Math Library for Secure Inference.
Proc. Priv. Enhancing Technol., 2022

Circuit-PSI With Linear Complexity via Relaxed Batch OPPRF.
Proc. Priv. Enhancing Technol., 2022

SecFloat: Accurate Floating-Point meets Secure 2-Party Computation.
IACR Cryptol. ePrint Arch., 2022

Short Leakage Resilient and Non-malleable Secret Sharing Schemes.
IACR Cryptol. ePrint Arch., 2022

Efficient ML Models for Practical Secure Inference.
CoRR, 2022

Telechain: Bridging Telecom Policy and Blockchain Practice.
Proceedings of the COMPASS '22: ACM SIGCAS/SIGCHI Conference on Computing and Sustainable Societies, Seattle, WA, USA, 29 June 2022, 2022

2021
Secure Featurization and Applications to Secure Phishing Detection.
IACR Cryptol. ePrint Arch., 2021

SIRNN: A Math Library for Secure RNN Inference.
IACR Cryptol. ePrint Arch., 2021

SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost.
IACR Cryptol. ePrint Arch., 2021

Universally Composable Almost-Everywhere Secure Computation.
IACR Cryptol. ePrint Arch., 2021

Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI.
IACR Cryptol. ePrint Arch., 2021

Production-level Open Source Privacy Preserving Inference in Medical Imaging.
CoRR, 2021

SiRnn: A Math Library for Secure RNN Inference.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Adaptive Extractors and Their Application to Leakage Resilient Secret Sharing.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
CrypTFlow2: Practical 2-Party Secure Inference.
IACR Cryptol. ePrint Arch., 2020

Constant Rate (Non-malleable) Secret Sharing Schemes Tolerating Joint Adaptive Leakage.
IACR Cryptol. ePrint Arch., 2020

Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.
IACR Cryptol. ePrint Arch., 2020

Secure Medical Image Analysis with CrypTFlow.
CoRR, 2020

Blockene: A High-throughput Blockchain Over Mobile Devices.
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020

2019
SecureNN: 3-Party Secure Computation for Neural Network Training.
Proc. Priv. Enhancing Technol., 2019

CrypTFlow: Secure TensorFlow Inference.
IACR Cryptol. ePrint Arch., 2019

EzPC: Programmable and Efficient Secure Two-Party Computation for Machine Learning.
Proceedings of the IEEE European Symposium on Security and Privacy, 2019

Universally Composable Secure Computation with Corrupted Tokens.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
SecureNN: Efficient and Private Neural Network Training.
IACR Cryptol. ePrint Arch., 2018

2017
EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation.
IACR Cryptol. ePrint Arch., 2017

Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case.
IACR Cryptol. ePrint Arch., 2017

Universally Composable Secure Two and Multi-party Computation in the Corruptible Tamper-Proof Hardware Token Model.
IACR Cryptol. ePrint Arch., 2017

HOP: Hardware makes Obfuscation Practical.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Hierarchical Functional Encryption.
Proceedings of the 8th Innovations in Theoretical Computer Science Conference, 2017

2016
Reducing Depth in Constrained PRFs: From Bit-Fixing to \mathbf NC^1.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Big Data Analytics over Encrypted Datasets with Seabed.
Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation, 2016

2015
Almost-Everywhere Secure Computation with Edge Corruptions.
J. Cryptol., 2015

Reducing Multilinear Map Levels in Constrained PRFs and ABE.
IACR Cryptol. ePrint Arch., 2015

Information-theoretic Local Non-malleable Codes and their Applications.
IACR Cryptol. ePrint Arch., 2015

Block-wise Non-Malleable Codes.
IACR Cryptol. ePrint Arch., 2015

Functional Encryption: Decentralised and Delegatable.
IACR Cryptol. ePrint Arch., 2015

Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices.
IACR Cryptol. ePrint Arch., 2015

The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults.
Proceedings of the 2015 Conference on Innovations in Theoretical Computer Science, 2015

2014
Privacy amplification with asymptotically optimal entropy loss.
J. ACM, 2014

Constrained Pseudorandom Functions: Verifiable and Delegatable.
IACR Cryptol. ePrint Arch., 2014

Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality.
IACR Cryptol. ePrint Arch., 2014

Achieving Privacy in Verifiable Computation with Multiple Servers - Without FHE and without Pre-processing.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

2013
Locally Updatable and Locally Decodable Codes.
IACR Cryptol. ePrint Arch., 2013

2012
Hardness Preserving Constructions of Pseudorandom Functions, Revisited.
IACR Cryptol. ePrint Arch., 2012

Functional Re-encryption and Collusion-Resistant Obfuscation.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Edge Fault Tolerance on Sparse Networks.
Proceedings of the Automata, Languages, and Programming - 39th International Colloquium, 2012

2011
Collusion Resistant Obfuscation and Functional Re-encryption.
IACR Cryptol. ePrint Arch., 2011

2010
Position-Based Quantum Cryptography: Impossibility and Constructions.
IACR Cryptol. ePrint Arch., 2010

Improved Fault Tolerance and Secure Computation on Sparse Networks.
Proceedings of the Automata, Languages and Programming, 37th International Colloquium, 2010

2009
Position Based Cryptography.
IACR Cryptol. ePrint Arch., 2009

A Secure Cryptographic Token Interface.
Proceedings of the 22nd IEEE Computer Security Foundations Symposium, 2009

2008
Improved algorithms for optimal embeddings.
ACM Trans. Algorithms, 2008

Public-Key Encryption with Efficient Amortized Updates.
IACR Cryptol. ePrint Arch., 2008

A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks.
IACR Cryptol. ePrint Arch., 2008

2007
New Constructions for UC Secure Computation using Tamper-proof Hardware.
IACR Cryptol. ePrint Arch., 2007

Ring Signatures of Sub-linear Size Without Random Oracles.
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007

Covert Multi-Party Computation.
Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), 2007

2006
Improved Algorithms for Optimal Embeddings.
Electron. Colloquium Comput. Complex., 2006


  Loading...