default search action
Nishanth Chandran
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j11]Sankha Das, Sayak Ray Chowdhury, Nishanth Chandran, Divya Gupta, Satya Lokam, Rahul Sharma:
Communication Efficient Secure and Private Multi-Party Deep Learning. Proc. Priv. Enhancing Technol. 2025(1): 169-183 (2025) - 2024
- [j10]Kanav Gupta, Neha Jawalkar, Ananta Mukherjee, Nishanth Chandran, Divya Gupta, Ashish Panwar, Rahul Sharma:
SIGMA: Secure GPT Inference with Function Secret Sharing. Proc. Priv. Enhancing Technol. 2024(4): 61-79 (2024) - [c41]Neha Jawalkar, Kanav Gupta, Arkaprava Basu, Nishanth Chandran, Divya Gupta, Rahul Sharma:
Orca: FSS-based Secure Training and Inference with GPUs. SP 2024: 597-616 - [i53]Rohit Dwivedula, Sriram Sridhar, Sambhav Satija, Muthian Sivathanu, Nishanth Chandran, Divya Gupta, Satya Lokam:
TrustRate: A Decentralized Platform for Hijack-Resistant Anonymous Reviews. CoRR abs/2402.18386 (2024) - [i52]Nishanth Chandran, Sunayana Sitaram, Divya Gupta, Rahul Sharma, Kashish Mittal, Manohar Swaminathan:
Private Benchmarking to Prevent Contamination and Improve Comparative Evaluation of LLMs. CoRR abs/2403.00393 (2024) - [i51]Divyanshu Bhardwaj, Sandhya Saravanan, Nishanth Chandran, Divya Gupta:
Securely Training Decision Trees Efficiently. IACR Cryptol. ePrint Arch. 2024: 1077 (2024) - [i50]Sankha Das, Sayak Ray Chowdhury, Nishanth Chandran, Divya Gupta, Satya Lokam, Rahul Sharma:
Communication Efficient Secure and Private Multi-Party Deep Learning. IACR Cryptol. ePrint Arch. 2024: 1471 (2024) - [i49]Nishanth Chandran, Juan A. Garay, Ankit Kumar Misra, Rafail Ostrovsky, Vassilis Zikas:
Adaptive Security, Erasures, and Network Assumptions in Communication-Local MPC. IACR Cryptol. ePrint Arch. 2024: 1489 (2024) - 2023
- [j9]Gauri Gupta, Krithika Ramesh, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Nishanth Chandran, Rijurekha Sen:
End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets. Proc. Priv. Enhancing Technol. 2023(4): 436-451 (2023) - [c40]Nishanth Chandran:
Security and Privacy in Machine Learning. ICISS 2023: 229-248 - [i48]Ananta Mukherjee, Peeyush Kumar, Boling Yang, Nishanth Chandran, Divya Gupta:
Privacy Preserving Multi-Agent Reinforcement Learning in Supply Chains. CoRR abs/2312.05686 (2023) - [i47]Neha Jawalkar, Kanav Gupta, Arkaprava Basu, Nishanth Chandran, Divya Gupta, Rahul Sharma:
Orca: FSS-based Secure Training with GPUs. IACR Cryptol. ePrint Arch. 2023: 206 (2023) - [i46]Gauri Gupta, Krithika Ramesh, Anwesh Bhattacharya, Divya Gupta, Rahul Sharma, Nishanth Chandran, Rijurekha Sen:
End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets. IACR Cryptol. ePrint Arch. 2023: 1010 (2023) - [i45]Kanav Gupta, Neha Jawalkar, Ananta Mukherjee, Nishanth Chandran, Divya Gupta, Ashish Panwar, Rahul Sharma:
SIGMA: Secure GPT Inference with Function Secret Sharing. IACR Cryptol. ePrint Arch. 2023: 1269 (2023) - 2022
- [j8]Nishanth Chandran, Divya Gupta, Akash Shah:
Circuit-PSI With Linear Complexity via Relaxed Batch OPPRF. Proc. Priv. Enhancing Technol. 2022(1): 353-372 (2022) - [j7]Kanav Gupta, Deepak Kumaraswamy, Nishanth Chandran, Divya Gupta:
LLAMA: A Low Latency Math Library for Secure Inference. Proc. Priv. Enhancing Technol. 2022(4): 274-294 (2022) - [c39]Nishanth Chandran, Pouyan Forghani, Juan A. Garay, Rafail Ostrovsky, Rutvik Patel, Vassilis Zikas:
Universally Composable Almost-Everywhere Secure Computation. ITC 2022: 14:1-14:25 - [c38]Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar:
Short Leakage Resilient and Non-malleable Secret Sharing Schemes. CRYPTO (1) 2022: 178-207 - [c37]Sudheesh Singanamalla, Apurv Mehra, Nishanth Chandran, Himanshi Lohchab, Seshanuradha Chava, Asit Kadayan, Sunil Bajpai, Kurtis Heimerl, Richard J. Anderson, Satya Lokam:
Telechain: Bridging Telecom Policy and Blockchain Practice. COMPASS 2022: 280-299 - [c36]Deevashwer Rathee, Anwesh Bhattacharya, Rahul Sharma, Divya Gupta, Nishanth Chandran, Aseem Rastogi:
SecFloat: Accurate Floating-Point meets Secure 2-Party Computation. SP 2022: 576-595 - [c35]Nishanth Chandran, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Akash Shah:
SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost. USENIX Security Symposium 2022: 1361-1378 - [i44]Sudheesh Singanamalla, Apurv Mehra, Nishanth Chandran, Himanshi Lohchab, Seshanuradha Chava, Asit Kadayan, Sunil Bajpai, Kurtis Heimerl, Richard J. Anderson, Satya Lokam:
Telechain: Bridging Telecom Policy and Blockchain Practice. CoRR abs/2205.12350 (2022) - [i43]Vinod Ganesan, Anwesh Bhattacharya, Pratyush Kumar, Divya Gupta, Rahul Sharma, Nishanth Chandran:
Efficient ML Models for Practical Secure Inference. CoRR abs/2209.00411 (2022) - [i42]Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar:
Short Leakage Resilient and Non-malleable Secret Sharing Schemes. IACR Cryptol. ePrint Arch. 2022: 216 (2022) - [i41]Deevashwer Rathee, Anwesh Bhattacharya, Rahul Sharma, Divya Gupta, Nishanth Chandran, Aseem Rastogi:
SecFloat: Accurate Floating-Point meets Secure 2-Party Computation. IACR Cryptol. ePrint Arch. 2022: 322 (2022) - [i40]Kanav Gupta, Deepak Kumaraswamy, Nishanth Chandran, Divya Gupta:
LLAMA: A Low Latency Math Library for Secure Inference. IACR Cryptol. ePrint Arch. 2022: 793 (2022) - 2021
- [c34]Nishanth Chandran, Nishka Dasgupta, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Akash Shah:
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI. CCS 2021: 1182-1204 - [c33]Akash Shah, Nishanth Chandran, Mesfin Dema, Divya Gupta, Arun Gururajan, Huan Yu:
Secure Featurization and Applications to Secure Phishing Detection. CCSW 2021: 83-95 - [c32]Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar:
Adaptive Extractors and Their Application to Leakage Resilient Secret Sharing. CRYPTO (3) 2021: 595-624 - [c31]Elette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta, Yuval Ishai, Nishant Kumar, Mayank Rathee:
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation. EUROCRYPT (2) 2021: 871-900 - [c30]Deevashwer Rathee, Mayank Rathee, Rahul Kranti Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi:
SiRnn: A Math Library for Secure RNN Inference. SP 2021: 1003-1020 - [i39]Deevashwer Rathee, Mayank Rathee, Rahul Kranti Kiran Goli, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi:
SIRNN: A Math Library for Secure RNN Inference. CoRR abs/2105.04236 (2021) - [i38]Arjun Soin, Pratik Bhatu, Rohit Takhar, Nishanth Chandran, Divya Gupta, Javier Alvarez-Valle, Rahul Sharma, Vidur Mahajan, Matthew P. Lungren:
Production-level Open Source Privacy Preserving Inference in Medical Imaging. CoRR abs/2107.10230 (2021) - [i37]Nishanth Chandran, Divya Gupta, Akash Shah:
Circuit-PSI with Linear Complexity via Relaxed Batch OPPRF. IACR Cryptol. ePrint Arch. 2021: 34 (2021) - [i36]Nishanth Chandran, Nishka Dasgupta, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar, Akash Shah:
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI. IACR Cryptol. ePrint Arch. 2021: 172 (2021) - [i35]Deevashwer Rathee, Mayank Rathee, G. Rahul Kranti Kiran, Divya Gupta, Rahul Sharma, Nishanth Chandran, Aseem Rastogi:
SIRNN: A Math Library for Secure RNN Inference. IACR Cryptol. ePrint Arch. 2021: 459 (2021) - [i34]Nishanth Chandran, Pouyan Forghani, Juan A. Garay, Rafail Ostrovsky, Rutvik Patel, Vassilis Zikas:
Universally Composable Almost-Everywhere Secure Computation. IACR Cryptol. ePrint Arch. 2021: 1398 (2021) - [i33]Akash Shah, Nishanth Chandran, Mesfin Dema, Divya Gupta, Arun Gururajan, Huan Yu:
Secure Featurization and Applications to Secure Phishing Detection. IACR Cryptol. ePrint Arch. 2021: 1448 (2021) - [i32]Nishanth Chandran, Divya Gupta, Sai Lakshmi Bhavana Obbattu, Akash Shah:
SIMC: ML Inference Secure Against Malicious Clients at Semi-Honest Cost. IACR Cryptol. ePrint Arch. 2021: 1538 (2021) - 2020
- [c29]Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow2: Practical 2-Party Secure Inference. CCS 2020: 325-342 - [c28]Sambhav Satija, Apurv Mehra, Sudheesh Singanamalla, Karan Grover, Muthian Sivathanu, Nishanth Chandran, Divya Gupta, Satya Lokam:
Blockene: A High-throughput Blockchain Over Mobile Devices. OSDI 2020: 567-582 - [c27]Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow: Secure TensorFlow Inference. SP 2020: 336-353 - [i31]Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow2: Practical 2-Party Secure Inference. CoRR abs/2010.06457 (2020) - [i30]Sambhav Satija, Apurv Mehra, Sudheesh Singanamalla, Karan Grover, Muthian Sivathanu, Nishanth Chandran, Divya Gupta, Satya Lokam:
Blockene: A High-throughput Blockchain Over Mobile Devices. CoRR abs/2010.07277 (2020) - [i29]Javier Alvarez-Valle, Pratik Bhatu, Nishanth Chandran, Divya Gupta, Aditya V. Nori, Aseem Rastogi, Mayank Rathee, Rahul Sharma, Shubham Ugare:
Secure Medical Image Analysis with CrypTFlow. CoRR abs/2012.05064 (2020) - [i28]Deevashwer Rathee, Mayank Rathee, Nishant Kumar, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow2: Practical 2-Party Secure Inference. IACR Cryptol. ePrint Arch. 2020: 1002 (2020) - [i27]Nishanth Chandran, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu, Sruthi Sekar:
Constant Rate (Non-malleable) Secret Sharing Schemes Tolerating Joint Adaptive Leakage. IACR Cryptol. ePrint Arch. 2020: 1252 (2020) - [i26]Elette Boyle, Nishanth Chandran, Niv Gilboa, Divya Gupta, Yuval Ishai, Nishant Kumar, Mayank Rathee:
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation. IACR Cryptol. ePrint Arch. 2020: 1392 (2020)
2010 – 2019
- 2019
- [j6]Sameer Wagh, Divya Gupta, Nishanth Chandran:
SecureNN: 3-Party Secure Computation for Neural Network Training. Proc. Priv. Enhancing Technol. 2019(3): 26-49 (2019) - [c26]Nishanth Chandran, Wutichai Chongchitmate, Rafail Ostrovsky, Ivan Visconti:
Universally Composable Secure Computation with Corrupted Tokens. CRYPTO (3) 2019: 432-461 - [c25]Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, Shardul Tripathi:
EzPC: Programmable and Efficient Secure Two-Party Computation for Machine Learning. EuroS&P 2019: 496-511 - [i25]Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow: Secure TensorFlow Inference. CoRR abs/1909.07814 (2019) - [i24]Nishant Kumar, Mayank Rathee, Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma:
CrypTFlow: Secure TensorFlow Inference. IACR Cryptol. ePrint Arch. 2019: 1049 (2019) - 2018
- [i23]Sameer Wagh, Divya Gupta, Nishanth Chandran:
SecureNN: Efficient and Private Neural Network Training. IACR Cryptol. ePrint Arch. 2018: 442 (2018) - 2017
- [c24]Nishanth Chandran, Juan A. Garay, Payman Mohassel, Satyanarayana Vusirikala:
Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case. CCS 2017: 277-294 - [c23]Zvika Brakerski, Nishanth Chandran, Vipul Goyal, Aayush Jain, Amit Sahai, Gil Segev:
Hierarchical Functional Encryption. ITCS 2017: 8:1-8:27 - [c22]Kartik Nayak, Christopher W. Fletcher, Ling Ren, Nishanth Chandran, Satya V. Lokam, Elaine Shi, Vipul Goyal:
HOP: Hardware makes Obfuscation Practical. NDSS 2017 - [i22]Nishanth Chandran, Juan A. Garay, Payman Mohassel, Satyanarayana Vusirikala:
Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case. IACR Cryptol. ePrint Arch. 2017: 519 (2017) - [i21]Nishanth Chandran, Wutichai Chongchitmate, Rafail Ostrovsky, Ivan Visconti:
Universally Composable Secure Two and Multi-party Computation in the Corruptible Tamper-Proof Hardware Token Model. IACR Cryptol. ePrint Arch. 2017: 1092 (2017) - [i20]Nishanth Chandran, Divya Gupta, Aseem Rastogi, Rahul Sharma, Shardul Tripathi:
EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation. IACR Cryptol. ePrint Arch. 2017: 1109 (2017) - 2016
- [c21]Nishanth Chandran, Vipul Goyal, Pratyay Mukherjee, Omkant Pandey, Jalaj Upadhyay:
Block-Wise Non-Malleable Codes. ICALP 2016: 31:1-31:14 - [c20]Antonis Papadimitriou, Ranjita Bhagwan, Nishanth Chandran, Ramachandran Ramjee, Andreas Haeberlen, Harmeet Singh, Abhishek Modi, Saikrishna Badrinarayanan:
Big Data Analytics over Encrypted Datasets with Seabed. OSDI 2016: 587-602 - [c19]Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy:
Reducing Depth in Constrained PRFs: From Bit-Fixing to \mathbf NC^1. Public Key Cryptography (2) 2016: 359-385 - [c18]Nishanth Chandran, Bhavana Kanukurthi, Srinivasan Raghuraman:
Information-Theoretic Local Non-malleable Codes and Their Applications. TCC (A2) 2016: 367-392 - 2015
- [j5]Nishanth Chandran, Juan A. Garay, Rafail Ostrovsky:
Almost-Everywhere Secure Computation with Edge Corruptions. J. Cryptol. 28(4): 745-768 (2015) - [c17]Nishanth Chandran, Wutichai Chongchitmate, Juan A. Garay, Shafi Goldwasser, Rafail Ostrovsky, Vassilis Zikas:
The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults. ITCS 2015: 153-162 - [i19]Nishanth Chandran, Vipul Goyal, Pratyay Mukherjee, Omkant Pandey, Jalaj Upadhyay:
Block-wise Non-Malleable Codes. IACR Cryptol. ePrint Arch. 2015: 129 (2015) - [i18]Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa:
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices. IACR Cryptol. ePrint Arch. 2015: 491 (2015) - [i17]Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy:
Reducing Multilinear Map Levels in Constrained PRFs and ABE. IACR Cryptol. ePrint Arch. 2015: 829 (2015) - [i16]Nishanth Chandran, Vipul Goyal, Aayush Jain, Amit Sahai:
Functional Encryption: Decentralised and Delegatable. IACR Cryptol. ePrint Arch. 2015: 1017 (2015) - [i15]Nishanth Chandran, Bhavana Kanukurthi, Srinivasan Raghuraman:
Information-theoretic Local Non-malleable Codes and their Applications. IACR Cryptol. ePrint Arch. 2015: 1056 (2015) - 2014
- [j4]Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky, Leonid Reyzin:
Privacy amplification with asymptotically optimal entropy loss. J. ACM 61(5): 29:1-29:28 (2014) - [j3]Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner:
Position-Based Quantum Cryptography: Impossibility and Constructions. SIAM J. Comput. 43(1): 150-178 (2014) - [j2]Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky:
Position-Based Cryptography. SIAM J. Comput. 43(4): 1291-1341 (2014) - [c16]Nishanth Chandran, Sanjam Garg:
Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions. INDOCRYPT 2014: 89-103 - [c15]Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa:
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices. Public Key Cryptography 2014: 95-112 - [c14]Prabhanjan Ananth, Nishanth Chandran, Vipul Goyal, Bhavana Kanukurthi, Rafail Ostrovsky:
Achieving Privacy in Verifiable Computation with Multiple Servers - Without FHE and without Pre-processing. Public Key Cryptography 2014: 149-166 - [c13]Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky:
Locally Updatable and Locally Decodable Codes. TCC 2014: 489-514 - [i14]Nishanth Chandran, Srinivasan Raghuraman, Dhinakaran Vinayagamurthy:
Constrained Pseudorandom Functions: Verifiable and Delegatable. IACR Cryptol. ePrint Arch. 2014: 522 (2014) - [i13]Nishanth Chandran, Wutichai Chongchitmate, Juan A. Garay, Shafi Goldwasser, Rafail Ostrovsky, Vassilis Zikas:
Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality. IACR Cryptol. ePrint Arch. 2014: 615 (2014) - 2013
- [i12]Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky:
Locally Updatable and Locally Decodable Codes. IACR Cryptol. ePrint Arch. 2013: 520 (2013) - 2012
- [c12]Nishanth Chandran, Juan A. Garay, Rafail Ostrovsky:
Edge Fault Tolerance on Sparse Networks. ICALP (2) 2012: 452-463 - [c11]Nishanth Chandran, Melissa Chase, Vinod Vaikuntanathan:
Functional Re-encryption and Collusion-Resistant Obfuscation. TCC 2012: 404-421 - [i11]Nishanth Chandran, Juan A. Garay, Rafail Ostrovsky:
Almost-Everywhere Secure Computation with Edge Corruptions. IACR Cryptol. ePrint Arch. 2012: 221 (2012) - [i10]Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky, Leonid Reyzin:
Privacy Amplification with Asymptotically Optimal Entropy Loss. IACR Cryptol. ePrint Arch. 2012: 501 (2012) - [i9]Nishanth Chandran, Sanjam Garg:
Hardness Preserving Constructions of Pseudorandom Functions, Revisited. IACR Cryptol. ePrint Arch. 2012: 616 (2012) - 2011
- [c10]Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner:
Position-Based Quantum Cryptography: Impossibility and Constructions. CRYPTO 2011: 429-446 - [i8]Nishanth Chandran, Melissa Chase, Vinod Vaikuntanathan:
Collusion Resistant Obfuscation and Functional Re-encryption. IACR Cryptol. ePrint Arch. 2011: 337 (2011) - 2010
- [c9]Nishanth Chandran, Juan A. Garay, Rafail Ostrovsky:
Improved Fault Tolerance and Secure Computation on Sparse Networks. ICALP (2) 2010: 249-260 - [c8]Nishanth Chandran, Rafail Ostrovsky, William E. Skeith III:
Public-Key Encryption with Efficient Amortized Updates. SCN 2010: 17-35 - [c7]Nishanth Chandran, Bhavana Kanukurthi, Rafail Ostrovsky, Leonid Reyzin:
Privacy amplification with asymptotically optimal entropy loss. STOC 2010: 785-794 - [i7]Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner:
Position-Based Quantum Cryptography: Impossibility and Constructions. CoRR abs/1009.2490 (2010) - [i6]Harry Buhrman, Nishanth Chandran, Serge Fehr, Ran Gelles, Vipul Goyal, Rafail Ostrovsky, Christian Schaffner:
Position-Based Quantum Cryptography: Impossibility and Constructions. IACR Cryptol. ePrint Arch. 2010: 275 (2010)
2000 – 2009
- 2009
- [c6]Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky:
Position Based Cryptography. CRYPTO 2009: 391-407 - [c5]Christian Cachin, Nishanth Chandran:
A Secure Cryptographic Token Interface. CSF 2009: 141-153 - [c4]Jan Camenisch, Nishanth Chandran, Victor Shoup:
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks. EUROCRYPT 2009: 351-368 - [i5]Nishanth Chandran, Vipul Goyal, Ryan Moriarty, Rafail Ostrovsky:
Position Based Cryptography. IACR Cryptol. ePrint Arch. 2009: 364 (2009) - 2008
- [j1]Nishanth Chandran, Ryan Moriarty, Rafail Ostrovsky, Omkant Pandey, Mohammad Ali Safari, Amit Sahai:
Improved algorithms for optimal embeddings. ACM Trans. Algorithms 4(4): 45:1-45:14 (2008) - [c3]Nishanth Chandran, Vipul Goyal, Amit Sahai:
New Constructions for UC Secure Computation Using Tamper-Proof Hardware. EUROCRYPT 2008: 545-562 - [i4]Jan Camenisch, Nishanth Chandran, Victor Shoup:
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks. IACR Cryptol. ePrint Arch. 2008: 375 (2008) - [i3]Nishanth Chandran, Rafail Ostrovsky, William E. Skeith III:
Public-Key Encryption with Efficient Amortized Updates. IACR Cryptol. ePrint Arch. 2008: 429 (2008) - 2007
- [c2]Nishanth Chandran, Vipul Goyal, Rafail Ostrovsky, Amit Sahai:
Covert Multi-Party Computation. FOCS 2007: 238-248 - [c1]Nishanth Chandran, Jens Groth, Amit Sahai:
Ring Signatures of Sub-linear Size Without Random Oracles. ICALP 2007: 423-434 - [i2]Nishanth Chandran, Vipul Goyal, Amit Sahai:
New Constructions for UC Secure Computation using Tamper-proof Hardware. IACR Cryptol. ePrint Arch. 2007: 334 (2007) - 2006
- [i1]Nishanth Chandran, Ryan Moriarty, Rafail Ostrovsky, Omkant Pandey, Amit Sahai:
Improved Algorithms for Optimal Embeddings. Electron. Colloquium Comput. Complex. TR06 (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint