Follow
Nishanth Chandran
Nishanth Chandran
Principal Researcher, Microsoft Research, India
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
SecureNN: 3-party secure computation for neural network training
S Wagh, D Gupta, N Chandran
Proceedings on Privacy Enhancing Technologies, 2019
601*2019
Cryptflow2: Practical 2-party secure inference
D Rathee, M Rathee, N Kumar, N Chandran, D Gupta, A Rastogi, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
3182020
Cryptflow: Secure tensorflow inference
N Kumar, M Rathee, N Chandran, D Gupta, A Rastogi, R Sharma
2020 IEEE Symposium on Security and Privacy (SP), 336-353, 2020
2872020
Position based cryptography
N Chandran, V Goyal, R Moriarty, R Ostrovsky
Annual International Cryptology Conference, 391-407, 2009
2342009
Position-based quantum cryptography: Impossibility and constructions
H Buhrman, N Chandran, S Fehr, R Gelles, V Goyal, R Ostrovsky, ...
SIAM Journal on Computing 43 (1), 150-178, 2014
2292014
Big data analytics over encrypted datasets with seabed
A Papadimitriou, R Bhagwan, N Chandran, R Ramjee, A Haeberlen, ...
12th USENIX symposium on operating systems design and implementation (OSDI …, 2016
1802016
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
J Camenisch, N Chandran, V Shoup
Annual International Conference on the Theory and Applications of …, 2009
1772009
EzPC: Programmable and efficient secure two-party computation for machine learning
N Chandran, D Gupta, A Rastogi, R Sharma, S Tripathi
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 496-511, 2019
1712019
Ring signatures of sub-linear size without random oracles
N Chandran, J Groth, A Sahai
International Colloquium on Automata, Languages, and Programming, 423-434, 2007
1512007
New constructions for UC secure computation using tamper-proof hardware
N Chandran, V Goyal, A Sahai
Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008
1242008
Function secret sharing for mixed-mode and fixed-point secure computation
E Boyle, N Chandran, N Gilboa, D Gupta, Y Ishai, N Kumar, M Rathee
Annual International Conference on the Theory and Applications of …, 2021
1052021
Sirnn: A math library for secure rnn inference
D Rathee, M Rathee, RKK Goli, D Gupta, R Sharma, N Chandran, ...
2021 IEEE Symposium on Security and Privacy (SP), 1003-1020, 2021
992021
User-controlled data encryption with obfuscated policy
N Chandran, ME Chase, KE Lauter, V Vaikuntanathan
US Patent 9,077,525, 2015
882015
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices
N Chandran, M Chase, FH Liu, R Nishimaki, K Xagawa
International Workshop on Public Key Cryptography, 95-112, 2014
682014
HOP: Hardware makes Obfuscation Practical.
K Nayak, CW Fletcher, L Ren, N Chandran, SV Lokam, E Shi, V Goyal
NDSS 2017, 0, 2017
672017
Functional re-encryption and collusion-resistant obfuscation
N Chandran, M Chase, V Vaikuntanathan
Theory of Cryptography Conference, 404-421, 2012
602012
Circuit-PSI with linear complexity via relaxed batch OPPRF
N Chandran, D Gupta, A Shah
Proceedings on Privacy Enhancing Technologies, 2022
572022
Block-wise non-malleable codes
N Chandran, V Goyal, P Mukherjee, O Pandey, J Upadhyay
Cryptology ePrint Archive, 2015
562015
Efficient linear multiparty PSI and extensions to circuit
N Chandran, N Dasgupta, D Gupta, SLB Obbattu, S Sekar, A Shah
quorum psi. Cryptology ePrint Archive, Report 172, 2021, 2021
542021
Achieving privacy in verifiable computation with multiple servers–without FHE and without pre-processing
P Ananth, N Chandran, V Goyal, B Kanukurthi, R Ostrovsky
International Workshop on Public Key Cryptography, 149-166, 2014
492014
The system can't perform the operation now. Try again later.
Articles 1–20