Cryptflow2: Practical 2-party secure inference D Rathee, M Rathee, N Kumar, N Chandran, D Gupta, A Rastogi, ... Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 283 | 2020 |
Sirnn: A math library for secure rnn inference D Rathee, M Rathee, RKK Goli, D Gupta, R Sharma, N Chandran, ... 2021 IEEE Symposium on Security and Privacy (SP), 1003-1020, 2021 | 85 | 2021 |
Improved multiplication triple generation over rings via RLWE-based AHE D Rathee, T Schneider, KK Shukla International Conference on Cryptology and Network Security, 347-359, 2019 | 35 | 2019 |
Secfloat: Accurate floating-point meets secure 2-party computation D Rathee, A Bhattacharya, R Sharma, D Gupta, N Chandran, A Rastogi 2022 IEEE Symposium on Security and Privacy (SP), 576-595, 2022 | 34 | 2022 |
ZEBRA: Anonymous Credentials with Practical On-chain Verification and Applications to KYC in DeFi. D Rathee, GV Policharla, T Xie, R Cottone, D Song IACR Cryptol. ePrint Arch. 2022, 1286, 2022 | 33 | 2022 |
Fast secure matrix multiplications over ring-based homomorphic encryption PK Mishra, D Rathee, DH Duong, M Yasuda Information Security Journal: A Global Perspective 30 (4), 219-234, 2021 | 28 | 2021 |
Faster PCA and linear regression through hypercubes in HElib D Rathee, PK Mishra, M Yasuda Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 42-53, 2018 | 27 | 2018 |
Secure two-party computation in a quantum world N Büscher, D Demmler, NP Karvelas, S Katzenbeisser, J Krämer, ... Applied Cryptography and Network Security: 18th International Conference …, 2020 | 19 | 2020 |
Linear-complexity private function evaluation is practical M Holz, Á Kiss, D Rathee, T Schneider Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020 | 12 | 2020 |
SIRNN: A math library for secure inference of RNNs D Rathee, M Rathee, RKK Goli, D Gupta, R Sharma, N Chandran, ... IEEE S&P, 2021 | 9 | 2021 |
Secure {Floating-Point} Training D Rathee, A Bhattacharya, D Gupta, R Sharma, D Song 32nd USENIX Security Symposium (USENIX Security 23), 6329-6346, 2023 | 8 | 2023 |
Efficient protocols for private wildcards pattern matching TK Saha, D Rathee, T Koshiba Journal of Information Security and Applications 55, 102609, 2020 | 5 | 2020 |
ZEBRA: SNARK-based Anonymous Credentials for Practical, Private and Accountable On-chain Access Control D Rathee, GV Policharla, T Xie, R Cottone, D Song Cryptology ePrint Archive, 2022 | 2 | 2022 |
Private inference in deep neural network N Chandran, D Gupta, A Rastogi, R Sharma, N Kumar, M Rathee, ... US Patent App. 17/085,986, 2023 | 1 | 2023 |
Secure Two-Party Computation in a Quantum World S Katzenbeisser, J Krämer, D Rathee, T Schneider, P Struck | | |