Sameer Wagh

According to our database1, Sameer Wagh authored at least 20 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A General Framework of Homomorphic Encryption for Multiple Parties with Non-interactive Key-Aggregation.
Proceedings of the Applied Cryptography and Network Security, 2024

2022
Pika: Secure Computation using Function Secret Sharing over Rings.
Proc. Priv. Enhancing Technol., 2022

Athena: Probabilistic Verification of Machine Unlearning.
Proc. Priv. Enhancing Technol., 2022

Piranha: A GPU Platform for Secure Computation.
IACR Cryptol. ePrint Arch., 2022

BarnOwl: Secure Comparisons using Silent Pseudorandom Correlation Generators.
IACR Cryptol. ePrint Arch., 2022

ELSA: Secure Aggregation for Federated Learning with Malicious Actors.
IACR Cryptol. ePrint Arch., 2022

2021
Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning.
Proc. Priv. Enhancing Technol., 2021

Rabbit: Efficient Comparison for Secure Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2021

A Unified Framework of Homomorphic Encryption for Multiple Parties with Non-Interactive Setup.
IACR Cryptol. ePrint Arch., 2021

DP-cryptography: marrying differential privacy and cryptography in emerging applications.
Commun. ACM, 2021

2020
Maliciously Secure Matrix Multiplication with Applications to Private Deep Learning.
IACR Cryptol. ePrint Arch., 2020

Towards Probabilistic Verification of Machine Unlearning.
CoRR, 2020

2019
Guard Placement Attacks on Path Selection Algorithms for Tor.
Proc. Priv. Enhancing Technol., 2019

SecureNN: 3-Party Secure Computation for Neural Network Training.
Proc. Priv. Enhancing Technol., 2019

DPSelect: A Differential Privacy Based Guard Relay Selection Algorithm for Tor.
Proc. Priv. Enhancing Technol., 2019

2018
Differentially Private Oblivious RAM.
Proc. Priv. Enhancing Technol., 2018

SecureNN: Efficient and Private Neural Network Training.
IACR Cryptol. ePrint Arch., 2018

2017
The Pyramid Scheme: Oblivious RAM for Trusted Processors.
CoRR, 2017

Camouflage: Memory Traffic Shaping to Mitigate Timing Attacks.
Proceedings of the 2017 IEEE International Symposium on High Performance Computer Architecture, 2017

2016
Root ORAM: A Tunable Differentially Private Oblivious RAM.
CoRR, 2016


  Loading...