Follow
Nishanth Chandran
Nishanth Chandran
Principal Researcher, Microsoft Research, India
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
SecureNN: 3-Party Secure Computation for Neural Network Training.
S Wagh, D Gupta, N Chandran
Proc. Priv. Enhancing Technol. 2019 (3), 26-49, 2019
391*2019
Position Based Cryptography.
N Chandran, V Goyal, R Moriarty, R Ostrovsky
CRYPTO 9, 391-407, 2009
2072009
Position-based quantum cryptography: Impossibility and constructions
H Buhrman, N Chandran, S Fehr, R Gelles, V Goyal, R Ostrovsky, ...
SIAM Journal on Computing 43 (1), 150-178, 2014
1822014
Cryptflow: Secure tensorflow inference
N Kumar, M Rathee, N Chandran, D Gupta, A Rastogi, R Sharma
2020 IEEE Symposium on Security and Privacy (SP), 336-353, 2020
1772020
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
J Camenisch, N Chandran, V Shoup
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009
1672009
Ring signatures of sub-linear size without random oracles
N Chandran, J Groth, A Sahai
Automata, Languages and Programming: 34th International Colloquium, ICALP …, 2007
1452007
Big Data Analytics over Encrypted Datasets with Seabed.
A Papadimitriou, R Bhagwan, N Chandran, R Ramjee, A Haeberlen, ...
OSDI 16, 587-602, 2016
1442016
CrypTFlow2: Practical 2-party secure inference
D Rathee, M Rathee, N Kumar, N Chandran, D Gupta, A Rastogi, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
1382020
New constructions for UC secure computation using tamper-proof hardware
N Chandran, V Goyal, A Sahai
Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008
1172008
EzPC: Programmable and efficient secure two-party computation for machine learning
N Chandran, D Gupta, A Rastogi, R Sharma, S Tripathi
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 496-511, 2019
872019
User-controlled data encryption with obfuscated policy
N Chandran, ME Chase, KE Lauter, V Vaikuntanathan
US Patent 9,077,525, 2015
712015
HOP: Hardware makes Obfuscation Practical.
K Nayak, CW Fletcher, L Ren, N Chandran, SV Lokam, E Shi, V Goyal
NDSS 2017, 0, 2017
592017
Functional re-encryption and collusion-resistant obfuscation
N Chandran, M Chase, V Vaikuntanathan
Theory of Cryptography: 9th Theory of Cryptography Conference, TCC 2012 …, 2012
562012
Block-wise non-malleable codes
N Chandran, V Goyal, P Mukherjee, O Pandey, J Upadhyay
Cryptology ePrint Archive, 2015
542015
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices
N Chandran, M Chase, FH Liu, R Nishimaki, K Xagawa
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
542014
EzPC: Programmable, efficient, and scalable secure two-party computation for machine learning
N Chandran, D Gupta, A Rastogi, R Sharma, S Tripathi
Cryptology ePrint Archive, 2017
482017
Privacy amplification with asymptotically optimal entropy loss
N Chandran, B Kanukurthi, R Ostrovsky, L Reyzin
Journal of the ACM (JACM) 61 (5), 1-28, 2014
472014
A secure cryptographic token interface
C Cachin, N Chandran
2009 22nd IEEE Computer Security Foundations Symposium, 141-153, 2009
472009
Function secret sharing for mixed-mode and fixed-point secure computation
E Boyle, N Chandran, N Gilboa, D Gupta, Y Ishai, N Kumar, M Rathee
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
432021
A clustering approach to solve the multiple travelling salesmen problem
N Chandran, TT Narendran, K Ganesh
International Journal of Industrial and Systems Engineering 1 (3), 372-387, 2006
432006
The system can't perform the operation now. Try again later.
Articles 1–20