Sameer Wagh

According to our database1, Sameer Wagh authored at least 23 papers between 2016 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Private Map-Secure Reduce: Infrastructure for Efficient AI Data Markets.
CoRR, November, 2025

Wave Hello to Privacy: Efficient Mixed-Mode MPC using Wavelet Transforms.
IACR Cryptol. ePrint Arch., 2025

2024
A General Framework of Homomorphic Encryption for Multiple Parties with Non-interactive Key-Aggregation.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
ELSA: Secure Aggregation for Federated Learning with Malicious Actors.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Athena: Probabilistic Verification of Machine Unlearning.
Proc. Priv. Enhancing Technol., 2022

Pika: Secure Computation using Function Secret Sharing over Rings.
IACR Cryptol. ePrint Arch., 2022

BarnOwl: Secure Comparisons using Silent Pseudorandom Correlation Generators.
IACR Cryptol. ePrint Arch., 2022

Piranha: A GPU Platform for Secure Computation.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning.
Proc. Priv. Enhancing Technol., 2021

A Unified Framework of Homomorphic Encryption for Multiple Parties with Non-Interactive Setup.
IACR Cryptol. ePrint Arch., 2021

DP-cryptography: marrying differential privacy and cryptography in emerging applications.
Commun. ACM, 2021

Rabbit: Efficient Comparison for Secure Multi-Party Computation.
Proceedings of the Financial Cryptography and Data Security, 2021

2020
New Directions in Efficient Privacy-Preserving Machine Learning
PhD thesis, 2020

Towards Probabilistic Verification of Machine Unlearning.
CoRR, 2020

Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Guard Placement Attacks on Path Selection Algorithms for Tor.
Proc. Priv. Enhancing Technol., 2019

SecureNN: 3-Party Secure Computation for Neural Network Training.
Proc. Priv. Enhancing Technol., 2019

DPSelect: A Differential Privacy Based Guard Relay Selection Algorithm for Tor.
Proc. Priv. Enhancing Technol., 2019

2018
Differentially Private Oblivious RAM.
Proc. Priv. Enhancing Technol., 2018

SecureNN: Efficient and Private Neural Network Training.
IACR Cryptol. ePrint Arch., 2018

2017
The Pyramid Scheme: Oblivious RAM for Trusted Processors.
CoRR, 2017

Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks.
Proceedings of the 2017 IEEE International Symposium on High Performance Computer Architecture, 2017

2016
Root ORAM: A Tunable Differentially Private Oblivious RAM.
CoRR, 2016


  Loading...