Obserwuj
Nishat Koti
Nishat Koti
Indian Institute of Science Bangalore
Zweryfikowany adres z iisc.ac.in - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
{SWIFT}: Super-fast and robust {Privacy-Preserving} machine learning
N Koti, M Pancholi, A Patra, A Suresh
30th USENIX Security Symposium (USENIX Security 21), 2651-2668, 2021
1082021
Tetrad: Actively secure 4pc for secure training and inference
N Koti, A Patra, R Rachuri, A Suresh
arXiv preprint arXiv:2106.02850, 2021
562021
Group‐oriented encryption for dynamic groups with constant rekeying cost
K Nishat, BR Purushothama
Security and communication networks 9 (17), 4120-4137, 2016
162016
MPClan: Protocol suite for privacy-conscious computations
N Koti, S Patil, A Patra, A Suresh
Journal of Cryptology 36 (3), 22, 2023
122023
Ruffle: Rapid 3-party shuffle protocols
AP Shriram, N Koti, VB Kukkala, A Patra, BR Gopal, S Sangal
Proceedings on Privacy Enhancing Technologies (PoPETs) 3, 2023
6*2023
Pentagod: Stepping beyond traditional god with five parties
N Koti, VB Kukkala, A Patra, B Raj Gopal
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
62022
Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model
BR Purushothama, N Koti
2015 International Conference on Advances in Computing, Communications and …, 2015
62015
Poster: Vogue: Faster computation of private heavy hitters
P Jangir, N Koti, VB Kukkala, A Patra, B Raj Gopal, S Sangal
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
42022
Vogue: Faster computation of private heavy hitters
P Jangir, N Koti, VB Kukkala, A Patra, BR Gopal, S Sangal
IEEE Transactions on Dependable and Secure Computing, 2023
32023
: Super-fast MPC with a Friend
B Karmakar, N Koti, A Patra, S Patranabis, P Paul, D Ravi
Cryptology ePrint Archive, 2023
32023
Find thy neighbourhood: Privacy-preserving local clustering
N Koti, VB Kukkala, A Patra, BR Gopal
Proceedings on Privacy Enhancing Technologies, 2023
22023
Attaining god beyond honest majority with friends and foes
A Hegde, N Koti, VB Kukkala, S Patil, A Patra, P Paul
International Conference on the Theory and Application of Cryptology and …, 2022
22022
Non-tree based group key management scheme with constant rekeying and storage cost
N Koti, E Keni, Kritika, BR Purushothama
Proceedings of the Third International Symposium on Women in Computing and …, 2015
22015
CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks
Y Wang, P Sarkar, N Koti, A Patra, M Annavaram
arXiv preprint arXiv:2311.04406, 2023
12023
Poster MPClan: Protocol Suite for Privacy-Conscious Computations
N Koti, S Patil, A Patra, A Suresh
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
12022
Dynamic Access Control in a Hierarchy with Constant Key Derivation Cost
N Koti, BR Purushothama
Progress in Intelligent Computing Techniques: Theory, Practice, and …, 2018
12018
Shield: Secure Allegation Escrow System with Stronger Guarantees
N Koti, VB Kukkala, A Patra, B Raj Gopal
Proceedings of the ACM Web Conference 2023, 2252-2262, 2023
2023
Entrada to Secure Graph Convolutional Networks
N Koti, VB Kukkala, A Patra, BR Gopal
Cryptology ePrint Archive, 2023
2023
On the Security of an Efficient Group Key Agreement Scheme for MANETs
BR Purushothama, N Koti
Cryptology ePrint Archive, 2015
2015
Poster: You Share Because We Care: Secure Allegation Escrow System
N Koti, VB Kukkala, A Patra
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20