default search action
Divya Gupta 0001
Person information
- affiliation: Microsoft Research India, Bangalore, India
- affiliation (PhD): UCLA, USA
Other persons with the same name
- Divya Gupta — disambiguation page
- Divya Gupta 0002 — Grenoble Alpes University, France
- Divya Gupta 0003 — Chandigarh University, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Kanav Gupta, Neha Jawalkar, Ananta Mukherjee, Nishanth Chandran, Divya Gupta, Ashish Panwar, Rahul Sharma:
SIGMA: Secure GPT Inference with Function Secret Sharing. Proc. Priv. Enhancing Technol. 2024(4): 61-79 (2024) - [c30]Neha Jawalkar, Kanav Gupta, Arkaprava Basu, Nishanth Chandran, Divya Gupta, Rahul Sharma:
Orca: FSS-based Secure Training and Inference with GPUs. SP 2024: 597-616 - [i45]Rohit Dwivedula, Sriram Sridhar, Sambhav Satija, Muthian Sivathanu, Nishanth Chandran, Divya Gupta, Satya Lokam:
TrustRate: A Decentralized Platform for Hijack-Resistant Anonymous Reviews. CoRR abs/2402.18386 (2024) - [i44]Nishanth Chandran, Sunayana Sitaram, Divya Gupta, Rahul Sharma, Kashish Mittal, Manohar Swaminathan:
Private Benchmarking to Prevent Contamination and Improve Comparative Evaluation of LLMs. CoRR abs/2403.00393 (2024) - [i43]Divyanshu Bhardwaj, Sandhya Saravanan, Nishanth Chandran, Divya Gupta:
Securely Training Decision Trees Efficiently. IACR Cryptol. ePrint Arch. 2024: 1077 (2024) - [i42]Sankha Das, Sayak Ray Chowdhury, Nishanth Chandran, Divya Gupta, Satya Lokam, Rahul Sharma:
Communication Efficient Secure and Private Multi-Party Deep Learning. IACR Cryptol. ePrint Arch. 2024: 1471 (2024) - 2023
- [j4]Gauri Gupta, Krithika Ramesh, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Nishanth Chandran, Rijurekha Sen:
End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets. Proc. Priv. Enhancing Technol. 2023(4): 436-451 (2023) - [c29]Deevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Dawn Song:
Secure Floating-Point Training. USENIX Security Symposium 2023: 6329-6346 - [i41]Ananta Mukherjee, Peeyush Kumar, Boling Yang, Nishanth Chandran, Divya Gupta:
Privacy Preserving Multi-Agent Reinforcement Learning in Supply Chains. CoRR abs/2312.05686 (2023) - [i40]Neha Jawalkar, Kanav Gupta, Arkaprava Basu, Nishanth Chandran, Divya Gupta, Rahul Sharma:
Orca: FSS-based Secure Training with GPUs. IACR Cryptol. ePrint Arch. 2023: 206 (2023) - [i39]Deevashwer Rathee, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Dawn Song:
Secure Floating-Point Training. IACR Cryptol. ePrint Arch. 2023: 467 (2023) - [i38]Gauri Gupta, Krithika Ramesh, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Nishanth Chandran, Rijurekha Sen:
End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets. IACR Cryptol. ePrint Arch. 2023: 1010 (2023) - [i37]Kanav Gupta, Neha Jawalkar, Ananta Mukherjee, Nishanth Chandran, Divya Gupta, Ashish Panwar, Rahul Sharma:
SIGMA: Secure GPT Inference with Function Secret Sharing. IACR Cryptol. ePrint Arch. 2023: 1269 (2023) - 2022
- [j3]Nishanth Chandran, Divya Gupta, Akash Shah:
Circuit-PSI With Linear Complexity via Relaxed Batch OPPRF. Proc. Priv. Enhancing Technol. 2022(1): 353-372 (2022) - [j2]Kanav Gupta, Deepak Kumaraswamy, Nishanth Chandran, Divya Gupta:
LLAMA: A Low Latency Math Library for Secure Inference. Proc. Priv. Enhancing Technol. 2022(4): 274-294 (2022) - [c28]Deevashwer Rathee, Anwesh Bhattacharya, Rahul Sharma, Divya Gupta, Nishanth Chandran, Aseem Rastogi:
SecFloat: Accurate Floating-Point meets Secure 2-Party Computation. SP 2022: 576-595 - [c27]Nishanth Chandran, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Akash Shah:
SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost. USENIX Security Symposium 2022: 1361-1378 - [i36]Vinod Ganesan, Anwesh Bhattacharya, Pratyush Kumar, Divya Gupta, Rahul Sharma, Nishanth Chandran:
Efficient ML Models for Practical Secure Inference. CoRR abs/2209.00411 (2022) - [i35]Deevashwer Rathee, Anwesh Bhattacharya, Rahul Sharma, Divya Gupta, Nishanth Chandran, Aseem Rastogi:
SecFloat: Accurate Floating-Point meets Secure 2-Party Computation. IACR Cryptol. ePrint Arch. 2022: 322 (2022) - [i34]Kanav Gupta, Deepak Kumaraswamy, Nishanth Chandran, Divya Gupta:
LLAMA: A Low Latency Math Library for Secure Inference. IACR Cryptol. ePrint Arch. 2022: 793 (2022) - 2021
- [c26]Nishanth Chandran, Nishka Dasgupta, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Akash Shah:
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI. CCS 2021: 1182-1204 - [c25]Akash Shah, Nishanth Chandran, Mesfin Dema, Divya Gupta, Arun Gururajan, Huan Yu:
Secure Featurization and Applications to Secure Phishing Detection. CCSW 2021: 83-95 - [c24]Elette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta, Yuval Ishai, Nishant Kumar, Mayank Rathee:
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation. EUROCRYPT (2) 2021: 871-900 - [c23]Deevashwer Rathee, Mayank Rathee, Rahul Kranti Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi:
SiRnn: A Math Library for Secure RNN Inference. SP 2021: 1003-1020 - [i33]Deevashwer Rathee, Mayank Rathee, Rahul Kranti Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi:
SIRNN: A Math Library for Secure RNN Inference. CoRR abs/2105.04236 (2021) - [i32]Arjun Soin, Pratik Bhatu, Rohit Takhar, Nishanth Chandran, Divya Gupta, Javier Alvarez-Valle, Rahul Sharma, Vidur Mahajan, Matthew P. Lungren:
Production-level Open Source Privacy Preserving Inference in Medical Imaging. CoRR abs/2107.10230 (2021) - [i31]Nishanth Chandran, Divya Gupta, Akash Shah:
Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF. IACR Cryptol. ePrint Arch. 2021: 34 (2021) - [i30]Nishanth Chandran, Nishka Dasgupta, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Akash Shah:
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI. IACR Cryptol. ePrint Arch. 2021: 172 (2021) - [i29]Deevashwer Rathee, Mayank Rathee, G. Rahul Kranti Kiran, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi:
SIRNN: A Math Library for Secure RNN Inference. IACR Cryptol. ePrint Arch. 2021: 459 (2021) - [i28]Akash Shah, Nishanth Chandran, Mesfin Dema, Divya Gupta, Arun Gururajan, Huan Yu:
Secure Featurization and Applications to Secure Phishing Detection. IACR Cryptol. ePrint Arch. 2021: 1448 (2021) - [i27]Nishanth Chandran, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Akash Shah:
SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost. IACR Cryptol. ePrint Arch. 2021: 1538 (2021) - 2020
- [c22]Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow2: Practical 2-Party Secure Inference. CCS 2020: 325-342 - [c21]Sambhav Satija, Apurv Mehra, Sudheesh Singanamalla, Karan Grover, Muthian Sivathanu, Nishanth Chandran, Divya Gupta, Satya Lokam:
Blockene: A High-throughput Blockchain Over Mobile Devices. OSDI 2020: 567-582 - [c20]Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow: Secure TensorFlow Inference. SP 2020: 336-353 - [i26]Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow2: Practical 2-Party Secure Inference. CoRR abs/2010.06457 (2020) - [i25]Sambhav Satija, Apurv Mehra, Sudheesh Singanamalla, Karan Grover, Muthian Sivathanu, Nishanth Chandran, Divya Gupta, Satya Lokam:
Blockene: A High-throughput Blockchain Over Mobile Devices. CoRR abs/2010.07277 (2020) - [i24]Javier Alvarez-Valle, Pratik Bhatu, Nishanth Chandran, Divya Gupta, Aditya V. Nori, Aseem Rastogi, Mayank Rathee, Rahul Sharma, Shubham Ugare:
Secure Medical Image Analysis with CrypTFlow. CoRR abs/2012.05064 (2020) - [i23]Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow2: Practical 2-Party Secure Inference. IACR Cryptol. ePrint Arch. 2020: 1002 (2020) - [i22]Elette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta, Yuval Ishai, Nishant Kumar, Mayank Rathee:
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation. IACR Cryptol. ePrint Arch. 2020: 1392 (2020)
2010 – 2019
- 2019
- [j1]Sameer Wagh, Divya Gupta, Nishanth Chandran:
SecureNN: 3-Party Secure Computation for Neural Network Training. Proc. Priv. Enhancing Technol. 2019(3): 26-49 (2019) - [c19]Divya Gupta, Hemanta K. Maji, Mingyuan Wang:
Explicit Rate-1 Non-malleable Codes for Local Tampering. CRYPTO (1) 2019: 435-466 - [c18]Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, Shardul Tripathi:
EzPC: Programmable and Efficient Secure Two-Party Computation for Machine Learning. EuroS&P 2019: 496-511 - [i21]Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow: Secure TensorFlow Inference. CoRR abs/1909.07814 (2019) - [i20]Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow: Secure TensorFlow Inference. IACR Cryptol. ePrint Arch. 2019: 1049 (2019) - 2018
- [c17]Divya Gupta, Hemanta K. Maji, Mingyuan Wang:
Non-malleable Codes Against Lookahead Tampering. INDOCRYPT 2018: 307-328 - [c16]Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao, Pratyay Mukherjee:
Obfuscation from Low Noise Multilinear Maps. INDOCRYPT 2018: 329-352 - [c15]Alexander R. Block, Divya Gupta, Hemanta K. Maji, Hai H. Nguyen:
Secure Computation Using Leaky Correlations (Asymptotically Optimal Constructions). TCC (2) 2018: 36-65 - [i19]Alexander R. Block, Divya Gupta, Hemanta K. Maji, Hai H. Nguyen:
Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions). IACR Cryptol. ePrint Arch. 2018: 372 (2018) - [i18]Sameer Wagh, Divya Gupta, Nishanth Chandran:
SecureNN: Efficient and Private Neural Network Training. IACR Cryptol. ePrint Arch. 2018: 442 (2018) - 2017
- [c14]Chongwon Cho, Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao, Antigoni Polychroniadou:
Laconic Oblivious Transfer and Its Applications. CRYPTO (2) 2017: 33-65 - [i17]Chongwon Cho, Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao, Antigoni Polychroniadou:
Laconic Oblivious Transfer and its Applications. IACR Cryptol. ePrint Arch. 2017: 491 (2017) - [i16]Divya Gupta, Hemanta K. Maji, Mingyuan Wang:
Constant-rate Non-malleable Codes in the Split-state Model. IACR Cryptol. ePrint Arch. 2017: 1048 (2017) - [i15]Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, Shardul Tripathi:
EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation. IACR Cryptol. ePrint Arch. 2017: 1109 (2017) - 2016
- [b1]Divya Gupta:
Program Obfuscation: Applications and Optimizations. University of California, Los Angeles, USA, 2016 - [c13]Divesh Aggarwal, Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Optimal Computational Split-state Non-malleable Codes. TCC (A2) 2016: 393-417 - [c12]Sanjam Garg, Divya Gupta, Peihan Miao, Omkant Pandey:
Secure Multiparty RAM Computation in Constant Rounds. TCC (B1) 2016: 491-520 - [i14]Nico Döttling, Sanjam Garg, Divya Gupta, Peihan Miao, Pratyay Mukherjee:
Obfuscation from Low Noise Multilinear Maps. IACR Cryptol. ePrint Arch. 2016: 599 (2016) - [i13]Sanjam Garg, Divya Gupta, Peihan Miao, Omkant Pandey:
Secure Multiparty RAM Computation in Constant Rounds. IACR Cryptol. ePrint Arch. 2016: 815 (2016) - 2015
- [c11]Saikrishna Badrinarayanan, Divya Gupta, Abhishek Jain, Amit Sahai:
Multi-input Functional Encryption for Unbounded Arity Functions. ASIACRYPT (1) 2015: 27-51 - [c10]Vipul Goyal, Divya Gupta, Amit Sahai:
Concurrent Secure Computation via Non-Black Box Simulation. CRYPTO (2) 2015: 23-42 - [c9]Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations. CRYPTO (1) 2015: 538-557 - [c8]Divya Gupta, Yuval Ishai, Hemanta K. Maji, Amit Sahai:
Secure Computation from Leaky Correlated Randomness. CRYPTO (2) 2015: 701-720 - [c7]Dan Boneh, Divya Gupta, Ilya Mironov, Amit Sahai:
Hosting Services on an Untrusted Cloud. EUROCRYPT (2) 2015: 404-436 - [c6]Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations. TCC (1) 2015: 375-397 - [i12]Vipul Goyal, Divya Gupta, Abhishek Jain:
What Information is Leaked under Concurrent Composition? IACR Cryptol. ePrint Arch. 2015: 420 (2015) - [i11]Divesh Aggarwal, Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Optimal Computational Split-state Non-malleable Codes. IACR Cryptol. ePrint Arch. 2015: 1063 (2015) - [i10]Vipul Goyal, Divya Gupta, Amit Sahai:
Concurrent Secure Computation via Non-Black Box Simulation. IACR Cryptol. ePrint Arch. 2015: 1107 (2015) - [i9]Saikrishna Badrinarayanan, Divya Gupta, Abhishek Jain, Amit Sahai:
Multi-Input Functional Encryption for Unbounded Arity Functions. IACR Cryptol. ePrint Arch. 2015: 1136 (2015) - 2014
- [c5]Prabhanjan Vijendra Ananth, Divya Gupta, Yuval Ishai, Amit Sahai:
Optimizing Obfuscation: Avoiding Barrington's Theorem. CCS 2014: 646-658 - [c4]Sanjam Garg, Divya Gupta:
Efficient Round Optimal Blind Signatures. EUROCRYPT 2014: 477-495 - [c3]Divya Gupta, Amit Sahai:
On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption. INDOCRYPT 2014: 71-88 - [i8]Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Explicit Non-Malleable Codes Resistant to Permutations. Electron. Colloquium Comput. Complex. TR14 (2014) - [i7]Sanjam Garg, Divya Gupta:
Efficient Round Optimal Blind Signatures. IACR Cryptol. ePrint Arch. 2014: 81 (2014) - [i6]Prabhanjan Ananth, Divya Gupta, Yuval Ishai, Amit Sahai:
Optimizing Obfuscation: Avoiding Barrington's Theorem. IACR Cryptol. ePrint Arch. 2014: 222 (2014) - [i5]Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Explicit Non-Malleable Codes Resistant to Permutations. IACR Cryptol. ePrint Arch. 2014: 316 (2014) - [i4]Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Explicit Non-malleable Codes Resistant to Permutations and Perturbations. IACR Cryptol. ePrint Arch. 2014: 841 (2014) - [i3]Shashank Agrawal, Divya Gupta, Hemanta K. Maji, Omkant Pandey, Manoj Prabhakaran:
Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering and Permutations. IACR Cryptol. ePrint Arch. 2014: 842 (2014) - 2013
- [c2]Vipul Goyal, Divya Gupta, Abhishek Jain:
What Information Is Leaked under Concurrent Composition? CRYPTO (2) 2013: 220-238 - 2012
- [c1]Khaled M. Elbassioni, Naveen Garg, Divya Gupta, Amit Kumar, Vishal Narula, Arindam Pal:
Approximation Algorithms for the Unsplittable Flow Problem on Paths and Trees. FSTTCS 2012: 267-275 - [i2]Divya Gupta, Amit Sahai:
On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption. CoRR abs/1210.3719 (2012) - [i1]Divya Gupta, Amit Sahai:
On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption. IACR Cryptol. ePrint Arch. 2012: 572 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint