


default search action
Ayantika Chatterjee
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j7]B. Pradeep Kumar Reddy
, Ayantika Chatterjee:
SMLaaS: Secure Machine Learning as a Service Ensuring Data and Model Parameter Privacy. Secur. Priv. 8(4) (2025)
[j6]Tanusree Parbat
, Ayantika Chatterjee
:
SHELDB: Client Storage Aware Homomorphic Encrypted Database Processing Framework With Low Communication Overhead. IEEE Trans. Serv. Comput. 18(2): 1026-1038 (2025)
[c20]Animesh Singh
, Ayantika Chatterjee
, Anupam Chattopadhyay
, Debdeep Mukhopadhyay
:
An Efficient Circuit Synthesis Framework for TFHE via Convex Sub-graph Optimization. AsiaCCS 2025: 13-29
[c19]Shiva Agarwal
, Suvadeep Hajra
, Ayantika Chatterjee
, Debdeep Mukhopadhyay
:
WiperSentinel: HPC Based Wiper Detection with Enhanced AutoEncoder. CANS 2025: 405-424
[c18]Bhuvnesh Chaturvedi
, Anirban Chakraborty
, Nimish Mishra
, Ayantika Chatterjee
, Debdeep Mukhopadhyay
:
IND-CPAbf C: A New Security Notion for Conditional Decryption in Fully Homomorphic Encryption. PQCrypto (2) 2025: 351-383
[i14]Bhuvnesh Chaturvedi, Anirban Chakraborty, Nimish Mishra, Ayantika Chatterjee, Debdeep Mukhopadhyay:
IND-CPAC: A New Security Notion for Conditional Decryption in Fully Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2025: 45 (2025)
[i13]Animesh Singh, Ayantika Chatterjee, Anupam Chattopadhyay, Debdeep Mukhopadhyay:
An Efficient Circuit Synthesis Framework for TFHE via Convex Sub-graph Optimization. IACR Cryptol. ePrint Arch. 2025: 1383 (2025)
[i12]B. Pradeep Kumar Reddy, Sameeksha Goyal, Ruchika Meel, Ayantika Chatterjee:
FHEMaLe: Framework for Homomorphic Encrypted Machine Learning. IACR Cryptol. ePrint Arch. 2025: 1684 (2025)- 2024
[c17]Soumik Sinha, Sayandeep Saha, Ayantika Chatterjee, Debdeep Mukhopadhyay:
FHEDGE: Encrypted Inference on Lightweight Edge Devices. APCCAS 2024: 452-456
[c16]Bhuvnesh Chaturvedi
, Anirban Chakraborty
, Ayantika Chatterjee
, Debdeep Mukhopadhyay
:
On the Security of Privacy-Preserving Machine Learning Against Model Stealing Attacks. CANS (2) 2024: 96-117
[c15]Bhuvnesh Chaturvedi
, Anirban Chakraborty
, Ayantika Chatterjee
, Debdeep Mukhopadhyay
:
"Ask and Thou Shall Receive": Reaction-Based Full Key Recovery Attacks on FHE. ESORICS (4) 2024: 457-477
[c14]Animesh Singh, Smita Das, Anirban Chakraborty, Rajat Sadhukhan, Ayantika Chatterjee, Debdeep Mukhopadhyay:
FHEDA: Efficient Circuit Synthesis with Reduced Bootstrapping for Torus FHE. EuroS&P 2024: 841-859
[c13]B. Pradeep Kumar Reddy, Ruchika Meel, Ayantika Chatterjee:
Encrypted KNN Implementation on Distributed Edge Device Network. SECRYPT 2024: 680-685
[c12]Reeshav Chowdhury, Aman Kumar, Vaibhav Dashrath Mohite, Ayantika Chatterjee:
Transferability of Evasion Attacks Against FHE Encrypted Inference - Official Work-in-Progress Paper. SPACE 2024: 40-68
[c11]Tanusree Parbat, Ayantika Chatterjee:
Secure Join and Compute in Encrypted Database. TrustCom 2024: 1480-1485
[i11]B. Pradeep Kumar Reddy, Ruchika Meel, Ayantika Chatterjee:
Encrypted KNN Implementation on Distributed Edge Device Network. IACR Cryptol. ePrint Arch. 2024: 648 (2024)
[i10]Amit Jana, Smita Das, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Related-Key Cryptanalysis of FUTURE. IACR Cryptol. ePrint Arch. 2024: 1614 (2024)- 2023
[j5]Tanusree Parbat
, Ayantika Chatterjee
:
Authorized Update in Multi-User Homomorphic Encrypted Cloud Database. IEEE Trans. Knowl. Data Eng. 35(8): 7796-7808 (2023)
[c10]Gulabi Mandal, Anik Roy, Ayantika Chatterjee, Soumyajit Dey:
Work-in-Progress: Age of Information-Aware CACC for Vehicle Platooning. EWSN 2023: 285-288
[c9]Tanusree Parbat
, Aniket Banerjee, Ayantika Chatterjee
:
Democracy in Your Hands!: Practical Multi-key Homomorphic E-Voting. ICISS 2023: 259-271
[i9]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
vr2FHE- Securing FHE from Reaction-based Key Recovery Attacks. IACR Cryptol. ePrint Arch. 2023: 561 (2023)
[i8]Animesh Singh, Smita Das, Anirban Chakraborty, Rajat Sadhukhan, Ayantika Chatterjee, Debdeep Mukhopadhyay:
FHEDA: Efficient Circuit Synthesis with Reduced Bootstrapping for Torus FHE. IACR Cryptol. ePrint Arch. 2023: 1310 (2023)
[i7]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Model Stealing Attacks On FHE-based Privacy-Preserving Machine Learning through Adversarial Examples. IACR Cryptol. ePrint Arch. 2023: 1665 (2023)- 2022
[j4]Soumik Sinha
, Sayandeep Saha, Manaar Alam
, Varun Agarwal, Ayantika Chatterjee
, Anoop Mishra
, Deepak Khazanchi, Debdeep Mukhopadhyay
:
Exploring Bitslicing Architectures for Enabling FHE-Assisted Machine Learning. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11): 4004-4015 (2022)
[i6]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Error Leakage using Timing Channel in FHE Ciphertexts from TFHE Library. IACR Cryptol. ePrint Arch. 2022: 685 (2022)
[i5]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors. IACR Cryptol. ePrint Arch. 2022: 1563 (2022)
[i4]Siddhartha Chowdhury, Sayani Sinha, Animesh Singh, Shubham Mishra, Chandan Chaudhary, Sikhar Patranabis, Pratyay Mukherjee, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Efficient Threshold FHE with Application to Real-Time Systems. IACR Cryptol. ePrint Arch. 2022: 1625 (2022)
[i3]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Demystifying the comments made on "A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors". IACR Cryptol. ePrint Arch. 2022: 1741 (2022)- 2021
[c8]Ayan Ghosh
, Abhishek Raj
, Ayantika Chatterjee
:
Encrypted Operator Design with Domain Aware Practical Performance Improvement. ICMC 2021: 93-107
[c7]Tanusree Parbat
, Ayantika Chatterjee
:
Encrypted SQL Arithmetic Functions Processing for Secure Cloud Database. SPACE 2021: 207-225- 2020
[j3]Ayantika Chatterjee
, Indranil Sengupta:
Sorting of Fully Homomorphic Encrypted Cloud Data: Can Partitioning be Effective? IEEE Trans. Serv. Comput. 13(3): 545-558 (2020)
2010 – 2019
- 2019
[c6]B. Pradeep Kumar Reddy, Ayantika Chatterjee:
Encrypted Classification Using Secure K-Nearest Neighbour Computation. SPACE 2019: 176-194- 2018
[j2]Ayantika Chatterjee, Indranil Sengupta:
Translating Algorithms to Handle Fully Homomorphic Encrypted Data on the Cloud. IEEE Trans. Cloud Comput. 6(1): 287-300 (2018)- 2015
[c5]Ayantika Chatterjee, Indranil Sengupta:
Windowing technique for Lazy Sorting of Encrypted data. CNS 2015: 633-637
[i2]Ayantika Chatterjee, Indranil Sengupta:
FURISC: FHE Encrypted URISC Design. IACR Cryptol. ePrint Arch. 2015: 699 (2015)
[i1]Ayantika Chatterjee, Indranil Sengupta:
Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud. IACR Cryptol. ePrint Arch. 2015: 981 (2015)- 2013
[c4]Ayantika Chatterjee, Manish Kaushal, Indranil Sengupta:
Accelerating Sorting of Fully Homomorphic Encrypted Data. INDOCRYPT 2013: 262-273- 2012
[j1]Ayantika Chatterjee, Indranil Sengupta:
Design of a high performance Binary Edwards Curve based processor secured against side channel analysis. Integr. 45(3): 331-340 (2012)
[c3]Ayantika Chatterjee, Indranil Sengupta:
FPGA implementation of extended reconfigurable Binary Edwards Curve based processor. ICNC 2012: 211-215
[c2]Ayantika Chatterjee, Indranil Sengupta:
High-Speed Unified Elliptic Curve Cryptosystem on FPGAs Using Binary Huff Curves. VDAT 2012: 243-251- 2011
[c1]Ayantika Chatterjee, Indranil Sengupta:
FPGA implementation of binary edwards curve usingternary representation. ACM Great Lakes Symposium on VLSI 2011: 73-78
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-12-28 00:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







