SecureNN: 3-party secure computation for neural network training S Wagh, D Gupta, N Chandran Proceedings on Privacy Enhancing Technologies, 2019 | 533* | 2019 |
CrypTFlow2: Practical 2-Party Secure Inference D Rathee, M Rathee, N Kumar, N Chandran, D Gupta, A Rastogi, ... Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 270 | 2020 |
Cryptflow: Secure tensorflow inference N Kumar, M Rathee, N Chandran, D Gupta, A Rastogi, R Sharma 2020 IEEE Symposium on Security and Privacy (SP), 336-353, 2020 | 250 | 2020 |
Ezpc: Programmable and efficient secure two-party computation for machine learning N Chandran, D Gupta, A Rastogi, R Sharma, S Tripathi 2019 IEEE European Symposium on Security and Privacy (EuroS&P), 496-511, 2019 | 157 | 2019 |
Optimizing obfuscation: avoiding Barrington's theorem P Ananth, D Gupta, Y Ishai, A Sahai Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 139 | 2014 |
Laconic oblivious transfer and its applications C Cho, N Döttling, S Garg, D Gupta, P Miao, A Polychroniadou Annual International Cryptology Conference, 33-65, 2017 | 93 | 2017 |
Sirnn: A math library for secure rnn inference D Rathee, M Rathee, RKK Goli, D Gupta, R Sharma, N Chandran, ... 2021 IEEE Symposium on Security and Privacy (SP), 1003-1020, 2021 | 91 | 2021 |
Function secret sharing for mixed-mode and fixed-point secure computation E Boyle, N Chandran, N Gilboa, D Gupta, Y Ishai, N Kumar, M Rathee Annual International Conference on the Theory and Applications of …, 2021 | 89 | 2021 |
Explicit non-malleable codes against bit-wise tampering and permutations S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015 | 79* | 2015 |
A rate-optimizing compiler for non-malleable codes against bit-wise tampering and permutations S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015 | 75 | 2015 |
Optimal computational split-state non-malleable codes D Aggarwal, S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran Theory of Cryptography Conference, 393-417, 2016 | 72 | 2016 |
Efficient round optimal blind signatures S Garg, D Gupta Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014 | 52 | 2014 |
Circuit-PSI with linear complexity via relaxed batch OPPRF N Chandran, D Gupta, A Shah Proceedings on Privacy Enhancing Technologies 2022 (1), 353-372, 2022 | 47 | 2022 |
Multi-input functional encryption for unbounded arity functions S Badrinarayanan, D Gupta, A Jain, A Sahai Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2016 | 36 | 2016 |
{SIMC}:{ML} Inference Secure Against Malicious Clients at {Semi-Honest} Cost N Chandran, D Gupta, SLB Obbattu, A Shah 31st USENIX Security Symposium (USENIX Security 22), 1361-1378, 2022 | 35 | 2022 |
Hosting services on an untrusted cloud D Boneh, D Gupta, I Mironov, A Sahai Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015 | 35 | 2015 |
SecFloat: Accurate Floating-Point meets Secure 2-Party Computation D Rathee, A Bhattacharya, R Sharma, D Gupta, N Chandran, A Rastogi 2022 IEEE Symposium on Security and Privacy (SP), 576-595, 2022 | 33 | 2022 |
LLAMA: A Low Latency Math Library for Secure Inference K Gupta, D Kumaraswamy, N Chandran, D Gupta Cryptology ePrint Archive, 2022 | 31 | 2022 |
Blockene: A high-throughput blockchain over mobile devices S Satija, A Mehra, S Singanamalla, K Grover, M Sivathanu, N Chandran, ... 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2020 | 31 | 2020 |
Secure multiparty RAM computation in constant rounds S Garg, D Gupta, P Miao, O Pandey Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016 | 30 | 2016 |