Nishat Koti

Orcid: 0000-0003-4923-8215

According to our database1, Nishat Koti authored at least 19 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Ruffle: Rapid 3-Party Shuffle Protocols.
Proc. Priv. Enhancing Technol., July, 2023

MPClan: Protocol Suite for Privacy-Conscious Computations.
J. Cryptol., July, 2023

Find Thy Neighbourhood: Privacy-Preserving Local Clustering.
Proc. Priv. Enhancing Technol., April, 2023

CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks.
IACR Cryptol. ePrint Arch., 2023

Entrada to Secure Graph Convolutional Networks.
IACR Cryptol. ePrint Arch., 2023

Shield: Secure Allegation Escrow System with Stronger Guarantees.
IACR Cryptol. ePrint Arch., 2023

sfAsterisk: Super-fast MPC with a Friend.
IACR Cryptol. ePrint Arch., 2023

2022
MPClan: Protocol Suite for Privacy-Conscious Computations.
IACR Cryptol. ePrint Arch., 2022

PentaGOD: Stepping beyond Traditional GOD with Five Parties.
IACR Cryptol. ePrint Arch., 2022

Vogue: Faster Computation of Private Heavy Hitters.
IACR Cryptol. ePrint Arch., 2022

Attaining GOD Beyond Honest Majority With Friends and Foes.
IACR Cryptol. ePrint Arch., 2022

Poster MPClan: : Protocol Suite for Privacy-Conscious Computations.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Poster: Vogue: Faster Computation of Private Heavy Hitters.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Tetrad: Actively Secure 4PC for Secure Training and Inference.
IACR Cryptol. ePrint Arch., 2021

2020
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning.
IACR Cryptol. ePrint Arch., 2020

2016
Group-oriented encryption for dynamic groups with constant rekeying cost.
Secur. Commun. Networks, 2016

2015
On the Security of an Efficient Group Key Agreement Scheme for MANETs.
IACR Cryptol. ePrint Arch., 2015

Non-tree Based Group Key Management Scheme With Constant Rekeying and Storage Cost.
Proceedings of the Third International Symposium on Women in Computing and Informatics, 2015

Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model.
Proceedings of the 2015 International Conference on Advances in Computing, 2015


  Loading...