Folgen
Divya Gupta
Divya Gupta
Principal Researcher, Microsoft Research India
Bestätigte E-Mail-Adresse bei microsoft.com - Startseite
Titel
Zitiert von
Zitiert von
Jahr
SecureNN: 3-party secure computation for neural network training
S Wagh, D Gupta, N Chandran
Proceedings on Privacy Enhancing Technologies, 2019
500*2019
Cryptflow: Secure tensorflow inference
N Kumar, M Rathee, N Chandran, D Gupta, A Rastogi, R Sharma
2020 IEEE Symposium on Security and Privacy (SP), 336-353, 2020
2372020
CrypTFlow2: Practical 2-Party Secure Inference
D Rathee, M Rathee, N Kumar, N Chandran, D Gupta, A Rastogi, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
2352020
Ezpc: Programmable and efficient secure two-party computation for machine learning
N Chandran, D Gupta, A Rastogi, R Sharma, S Tripathi
2019 IEEE European Symposium on Security and Privacy (EuroS&P), 496-511, 2019
1492019
Optimizing obfuscation: avoiding Barrington's theorem
P Ananth, D Gupta, Y Ishai, A Sahai
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
1372014
Laconic oblivious transfer and its applications
C Cho, N Döttling, S Garg, D Gupta, P Miao, A Polychroniadou
Annual International Cryptology Conference, 33-65, 2017
902017
Function secret sharing for mixed-mode and fixed-point secure computation
E Boyle, N Chandran, N Gilboa, D Gupta, Y Ishai, N Kumar, M Rathee
Annual International Conference on the Theory and Applications of …, 2021
802021
Sirnn: A math library for secure rnn inference
D Rathee, M Rathee, RKK Goli, D Gupta, R Sharma, N Chandran, ...
2021 IEEE Symposium on Security and Privacy (SP), 1003-1020, 2021
80*2021
Explicit non-malleable codes against bit-wise tampering and permutations
S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran
Advances in Cryptology--CRYPTO 2015: 35th Annual Cryptology Conference …, 2015
77*2015
A rate-optimizing compiler for non-malleable codes against bit-wise tampering and permutations
S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran
Theory of Cryptography: 12th Theory of Cryptography Conference, TCC 2015 …, 2015
722015
Optimal computational split-state non-malleable codes
D Aggarwal, S Agrawal, D Gupta, HK Maji, O Pandey, M Prabhakaran
Theory of Cryptography Conference, 393-417, 2016
692016
Efficient round optimal blind signatures
S Garg, D Gupta
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
512014
Hosting services on an untrusted cloud
D Boneh, D Gupta, I Mironov, A Sahai
Advances in Cryptology-EUROCRYPT 2015: 34th Annual International Conference …, 2015
362015
Multi-input functional encryption for unbounded arity functions
S Badrinarayanan, D Gupta, A Jain, A Sahai
Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2016
342016
Circuit-PSI with linear complexity via relaxed batch OPPRF
N Chandran, D Gupta, A Shah
Proceedings on Privacy Enhancing Technologies 2022 (1), 353-372, 2022
332022
{SIMC}:{ML} Inference Secure Against Malicious Clients at {Semi-Honest} Cost
N Chandran, D Gupta, SLB Obbattu, A Shah
31st USENIX Security Symposium (USENIX Security 22), 1361-1378, 2022
322022
Secure multiparty RAM computation in constant rounds
S Garg, D Gupta, P Miao, O Pandey
Theory of Cryptography: 14th International Conference, TCC 2016-B, Beijing …, 2016
302016
On constant-round concurrent zero-knowledge from a knowledge assumption
D Gupta, A Sahai
International Conference on Cryptology in India, 71-88, 2014
302014
SecFloat: Accurate Floating-Point meets Secure 2-Party Computation
D Rathee, A Bhattacharya, R Sharma, D Gupta, N Chandran, A Rastogi
2022 IEEE Symposium on Security and Privacy (SP), 576-595, 2022
262022
Blockene: A high-throughput blockchain over mobile devices
S Satija, A Mehra, S Singanamalla, K Grover, M Sivathanu, N Chandran, ...
14th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2020
262020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20