BibTeX records: Divya Gupta 0001

download as .bib file

@article{DBLP:journals/corr/abs-2402-18386,
  author       = {Rohit Dwivedula and
                  Sriram Sridhar and
                  Sambhav Satija and
                  Muthian Sivathanu and
                  Nishanth Chandran and
                  Divya Gupta and
                  Satya Lokam},
  title        = {TrustRate: {A} Decentralized Platform for Hijack-Resistant Anonymous
                  Reviews},
  journal      = {CoRR},
  volume       = {abs/2402.18386},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.18386},
  doi          = {10.48550/ARXIV.2402.18386},
  eprinttype    = {arXiv},
  eprint       = {2402.18386},
  timestamp    = {Wed, 10 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-18386.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2403-00393,
  author       = {Nishanth Chandran and
                  Sunayana Sitaram and
                  Divya Gupta and
                  Rahul Sharma and
                  Kashish Mittal and
                  Manohar Swaminathan},
  title        = {Private Benchmarking to Prevent Contamination and Improve Comparative
                  Evaluation of LLMs},
  journal      = {CoRR},
  volume       = {abs/2403.00393},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2403.00393},
  doi          = {10.48550/ARXIV.2403.00393},
  eprinttype    = {arXiv},
  eprint       = {2403.00393},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2403-00393.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GuptaRBGSCS23,
  author       = {Gauri Gupta and
                  Krithika Ramesh and
                  Anwesh Bhattacharya and
                  Divya Gupta and
                  Rahul Sharma and
                  Nishanth Chandran and
                  Rijurekha Sen},
  title        = {End-to-end Privacy Preserving Training and Inference for Air Pollution
                  Forecasting with Data from Rival Fleets},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2023},
  number       = {4},
  pages        = {436--451},
  year         = {2023},
  url          = {https://doi.org/10.56553/popets-2023-0118},
  doi          = {10.56553/POPETS-2023-0118},
  timestamp    = {Thu, 17 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/GuptaRBGSCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/RatheeB00S23,
  author       = {Deevashwer Rathee and
                  Anwesh Bhattacharya and
                  Divya Gupta and
                  Rahul Sharma and
                  Dawn Song},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Secure Floating-Point Training},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {6329--6346},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/rathee},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/RatheeB00S23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-05686,
  author       = {Ananta Mukherjee and
                  Peeyush Kumar and
                  Boling Yang and
                  Nishanth Chandran and
                  Divya Gupta},
  title        = {Privacy Preserving Multi-Agent Reinforcement Learning in Supply Chains},
  journal      = {CoRR},
  volume       = {abs/2312.05686},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.05686},
  doi          = {10.48550/ARXIV.2312.05686},
  eprinttype    = {arXiv},
  eprint       = {2312.05686},
  timestamp    = {Wed, 03 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-05686.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JawalkarGBCGS23,
  author       = {Neha Jawalkar and
                  Kanav Gupta and
                  Arkaprava Basu and
                  Nishanth Chandran and
                  Divya Gupta and
                  Rahul Sharma},
  title        = {Orca: FSS-based Secure Training with GPUs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {206},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/206},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/JawalkarGBCGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RatheeBGSS23,
  author       = {Deevashwer Rathee and
                  Anwesh Bhattacharya and
                  Divya Gupta and
                  Rahul Sharma and
                  Dawn Song},
  title        = {Secure Floating-Point Training},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {467},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/467},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RatheeBGSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuptaRB00CS23,
  author       = {Gauri Gupta and
                  Krithika Ramesh and
                  Anwesh Bhattacharya and
                  Divya Gupta and
                  Rahul Sharma and
                  Nishanth Chandran and
                  Rijurekha Sen},
  title        = {End-to-end Privacy Preserving Training and Inference for Air Pollution
                  Forecasting with Data from Rival Fleets},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1010},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1010},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuptaRB00CS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuptaJMCGPS23,
  author       = {Kanav Gupta and
                  Neha Jawalkar and
                  Ananta Mukherjee and
                  Nishanth Chandran and
                  Divya Gupta and
                  Ashish Panwar and
                  Rahul Sharma},
  title        = {{SIGMA:} Secure {GPT} Inference with Function Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1269},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1269},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuptaJMCGPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/ChandranGS22,
  author       = {Nishanth Chandran and
                  Divya Gupta and
                  Akash Shah},
  title        = {Circuit-PSI With Linear Complexity via Relaxed Batch {OPPRF}},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {1},
  pages        = {353--372},
  year         = {2022},
  url          = {https://doi.org/10.2478/popets-2022-0018},
  doi          = {10.2478/POPETS-2022-0018},
  timestamp    = {Mon, 06 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/ChandranGS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/GuptaKCG22,
  author       = {Kanav Gupta and
                  Deepak Kumaraswamy and
                  Nishanth Chandran and
                  Divya Gupta},
  title        = {{LLAMA:} {A} Low Latency Math Library for Secure Inference},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {4},
  pages        = {274--294},
  year         = {2022},
  url          = {https://doi.org/10.56553/popets-2022-0109},
  doi          = {10.56553/POPETS-2022-0109},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/GuptaKCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RatheeB00CR22,
  author       = {Deevashwer Rathee and
                  Anwesh Bhattacharya and
                  Rahul Sharma and
                  Divya Gupta and
                  Nishanth Chandran and
                  Aseem Rastogi},
  title        = {SecFloat: Accurate Floating-Point meets Secure 2-Party Computation},
  booktitle    = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco,
                  CA, USA, May 22-26, 2022},
  pages        = {576--595},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SP46214.2022.9833697},
  doi          = {10.1109/SP46214.2022.9833697},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/RatheeB00CR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Chandran0OS22,
  author       = {Nishanth Chandran and
                  Divya Gupta and
                  Sai Lakshmi Bhavana Obbattu and
                  Akash Shah},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {{SIMC:} {ML} Inference Secure Against Malicious Clients at Semi-Honest
                  Cost},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {1361--1378},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/chandran},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/Chandran0OS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-00411,
  author       = {Vinod Ganesan and
                  Anwesh Bhattacharya and
                  Pratyush Kumar and
                  Divya Gupta and
                  Rahul Sharma and
                  Nishanth Chandran},
  title        = {Efficient {ML} Models for Practical Secure Inference},
  journal      = {CoRR},
  volume       = {abs/2209.00411},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.00411},
  doi          = {10.48550/ARXIV.2209.00411},
  eprinttype    = {arXiv},
  eprint       = {2209.00411},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-00411.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RatheeBSGCR22,
  author       = {Deevashwer Rathee and
                  Anwesh Bhattacharya and
                  Rahul Sharma and
                  Divya Gupta and
                  Nishanth Chandran and
                  Aseem Rastogi},
  title        = {SecFloat: Accurate Floating-Point meets Secure 2-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {322},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/322},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/RatheeBSGCR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuptaKC022,
  author       = {Kanav Gupta and
                  Deepak Kumaraswamy and
                  Nishanth Chandran and
                  Divya Gupta},
  title        = {{LLAMA:} {A} Low Latency Math Library for Secure Inference},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {793},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/793},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuptaKC022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChandranD0OSS21,
  author       = {Nishanth Chandran and
                  Nishka Dasgupta and
                  Divya Gupta and
                  Sai Lakshmi Bhavana Obbattu and
                  Sruthi Sekar and
                  Akash Shah},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Efficient Linear Multiparty {PSI} and Extensions to Circuit/Quorum
                  {PSI}},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {1182--1204},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484591},
  doi          = {10.1145/3460120.3484591},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ChandranD0OSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccsw-ws/ShahCD0GY21,
  author       = {Akash Shah and
                  Nishanth Chandran and
                  Mesfin Dema and
                  Divya Gupta and
                  Arun Gururajan and
                  Huan Yu},
  editor       = {Yinqian Zhang and
                  Marten van Dijk},
  title        = {Secure Featurization and Applications to Secure Phishing Detection},
  booktitle    = {CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security
                  Workshop, Virtual Event, Republic of Korea, 15 November 2021},
  pages        = {83--95},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474123.3486759},
  doi          = {10.1145/3474123.3486759},
  timestamp    = {Thu, 12 Oct 2023 12:32:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccsw-ws/ShahCD0GY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BoyleCG0I0R21,
  author       = {Elette Boyle and
                  Nishanth Chandran and
                  Niv Gilboa and
                  Divya Gupta and
                  Yuval Ishai and
                  Nishant Kumar and
                  Mayank Rathee},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12697},
  pages        = {871--900},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77886-6\_30},
  doi          = {10.1007/978-3-030-77886-6\_30},
  timestamp    = {Mon, 28 Aug 2023 21:17:52 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BoyleCG0I0R21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/RatheeRGGSCR21,
  author       = {Deevashwer Rathee and
                  Mayank Rathee and
                  Rahul Kranti Kiran Goli and
                  Divya Gupta and
                  Rahul Sharma and
                  Nishanth Chandran and
                  Aseem Rastogi},
  title        = {SiRnn: {A} Math Library for Secure {RNN} Inference},
  booktitle    = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco,
                  CA, USA, 24-27 May 2021},
  pages        = {1003--1020},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SP40001.2021.00086},
  doi          = {10.1109/SP40001.2021.00086},
  timestamp    = {Thu, 21 Sep 2023 15:57:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/RatheeRGGSCR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-04236,
  author       = {Deevashwer Rathee and
                  Mayank Rathee and
                  Rahul Kranti Kiran Goli and
                  Divya Gupta and
                  Rahul Sharma and
                  Nishanth Chandran and
                  Aseem Rastogi},
  title        = {{SIRNN:} {A} Math Library for Secure {RNN} Inference},
  journal      = {CoRR},
  volume       = {abs/2105.04236},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.04236},
  eprinttype    = {arXiv},
  eprint       = {2105.04236},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-04236.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-10230,
  author       = {Arjun Soin and
                  Pratik Bhatu and
                  Rohit Takhar and
                  Nishanth Chandran and
                  Divya Gupta and
                  Javier Alvarez{-}Valle and
                  Rahul Sharma and
                  Vidur Mahajan and
                  Matthew P. Lungren},
  title        = {Production-level Open Source Privacy Preserving Inference in Medical
                  Imaging},
  journal      = {CoRR},
  volume       = {abs/2107.10230},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.10230},
  eprinttype    = {arXiv},
  eprint       = {2107.10230},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-10230.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranGS21,
  author       = {Nishanth Chandran and
                  Divya Gupta and
                  Akash Shah},
  title        = {Circuit-PSI with Linear Complexity via Relaxed Batch {OPPRF}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {34},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/034},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranGS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranDGOSS21,
  author       = {Nishanth Chandran and
                  Nishka Dasgupta and
                  Divya Gupta and
                  Sai Lakshmi Bhavana Obbattu and
                  Sruthi Sekar and
                  Akash Shah},
  title        = {Efficient Linear Multiparty {PSI} and Extensions to Circuit/Quorum
                  {PSI}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {172},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/172},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranDGOSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RatheeRKGSCR21,
  author       = {Deevashwer Rathee and
                  Mayank Rathee and
                  G. Rahul Kranti Kiran and
                  Divya Gupta and
                  Rahul Sharma and
                  Nishanth Chandran and
                  Aseem Rastogi},
  title        = {{SIRNN:} {A} Math Library for Secure {RNN} Inference},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {459},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/459},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RatheeRKGSCR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShahCDGGY21,
  author       = {Akash Shah and
                  Nishanth Chandran and
                  Mesfin Dema and
                  Divya Gupta and
                  Arun Gururajan and
                  Huan Yu},
  title        = {Secure Featurization and Applications to Secure Phishing Detection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1448},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1448},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ShahCDGGY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranGOS21,
  author       = {Nishanth Chandran and
                  Divya Gupta and
                  Sai Lakshmi Bhavana Obbattu and
                  Akash Shah},
  title        = {{SIMC:} {ML} Inference Secure Against Malicious Clients at Semi-Honest
                  Cost},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1538},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1538},
  timestamp    = {Fri, 10 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranGOS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RatheeR0CGR020,
  author       = {Deevashwer Rathee and
                  Mayank Rathee and
                  Nishant Kumar and
                  Nishanth Chandran and
                  Divya Gupta and
                  Aseem Rastogi and
                  Rahul Sharma},
  editor       = {Jay Ligatti and
                  Xinming Ou and
                  Jonathan Katz and
                  Giovanni Vigna},
  title        = {CrypTFlow2: Practical 2-Party Secure Inference},
  booktitle    = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, USA, November 9-13, 2020},
  pages        = {325--342},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372297.3417274},
  doi          = {10.1145/3372297.3417274},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RatheeR0CGR020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/osdi/SatijaMSGSCGL20,
  author       = {Sambhav Satija and
                  Apurv Mehra and
                  Sudheesh Singanamalla and
                  Karan Grover and
                  Muthian Sivathanu and
                  Nishanth Chandran and
                  Divya Gupta and
                  Satya Lokam},
  title        = {Blockene: {A} High-throughput Blockchain Over Mobile Devices},
  booktitle    = {14th {USENIX} Symposium on Operating Systems Design and Implementation,
                  {OSDI} 2020, Virtual Event, November 4-6, 2020},
  pages        = {567--582},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/osdi20/presentation/satija},
  timestamp    = {Tue, 02 Feb 2021 08:05:52 +0100},
  biburl       = {https://dblp.org/rec/conf/osdi/SatijaMSGSCGL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/0001RCGR020,
  author       = {Nishant Kumar and
                  Mayank Rathee and
                  Nishanth Chandran and
                  Divya Gupta and
                  Aseem Rastogi and
                  Rahul Sharma},
  title        = {CrypTFlow: Secure TensorFlow Inference},
  booktitle    = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco,
                  CA, USA, May 18-21, 2020},
  pages        = {336--353},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/SP40000.2020.00092},
  doi          = {10.1109/SP40000.2020.00092},
  timestamp    = {Thu, 21 Sep 2023 15:57:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/0001RCGR020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-06457,
  author       = {Deevashwer Rathee and
                  Mayank Rathee and
                  Nishant Kumar and
                  Nishanth Chandran and
                  Divya Gupta and
                  Aseem Rastogi and
                  Rahul Sharma},
  title        = {CrypTFlow2: Practical 2-Party Secure Inference},
  journal      = {CoRR},
  volume       = {abs/2010.06457},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.06457},
  eprinttype    = {arXiv},
  eprint       = {2010.06457},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-06457.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-07277,
  author       = {Sambhav Satija and
                  Apurv Mehra and
                  Sudheesh Singanamalla and
                  Karan Grover and
                  Muthian Sivathanu and
                  Nishanth Chandran and
                  Divya Gupta and
                  Satya Lokam},
  title        = {Blockene: {A} High-throughput Blockchain Over Mobile Devices},
  journal      = {CoRR},
  volume       = {abs/2010.07277},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.07277},
  eprinttype    = {arXiv},
  eprint       = {2010.07277},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-07277.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-05064,
  author       = {Javier Alvarez{-}Valle and
                  Pratik Bhatu and
                  Nishanth Chandran and
                  Divya Gupta and
                  Aditya V. Nori and
                  Aseem Rastogi and
                  Mayank Rathee and
                  Rahul Sharma and
                  Shubham Ugare},
  title        = {Secure Medical Image Analysis with CrypTFlow},
  journal      = {CoRR},
  volume       = {abs/2012.05064},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.05064},
  eprinttype    = {arXiv},
  eprint       = {2012.05064},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-05064.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RatheeRKCGRS20,
  author       = {Deevashwer Rathee and
                  Mayank Rathee and
                  Nishant Kumar and
                  Nishanth Chandran and
                  Divya Gupta and
                  Aseem Rastogi and
                  Rahul Sharma},
  title        = {CrypTFlow2: Practical 2-Party Secure Inference},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1002},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1002},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/RatheeRKCGRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoyleCGGIKR20,
  author       = {Elette Boyle and
                  Nishanth Chandran and
                  Niv Gilboa and
                  Divya Gupta and
                  Yuval Ishai and
                  Nishant Kumar and
                  Mayank Rathee},
  title        = {Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1392},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1392},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BoyleCGGIKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/WaghGC19,
  author       = {Sameer Wagh and
                  Divya Gupta and
                  Nishanth Chandran},
  title        = {SecureNN: 3-Party Secure Computation for Neural Network Training},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2019},
  number       = {3},
  pages        = {26--49},
  year         = {2019},
  url          = {https://doi.org/10.2478/popets-2019-0035},
  doi          = {10.2478/POPETS-2019-0035},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/popets/WaghGC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0001MW19,
  author       = {Divya Gupta and
                  Hemanta K. Maji and
                  Mingyuan Wang},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Explicit Rate-1 Non-malleable Codes for Local Tampering},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {435--466},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_16},
  doi          = {10.1007/978-3-030-26948-7\_16},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/0001MW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/ChandranGRST19,
  author       = {Nishanth Chandran and
                  Divya Gupta and
                  Aseem Rastogi and
                  Rahul Sharma and
                  Shardul Tripathi},
  title        = {EzPC: Programmable and Efficient Secure Two-Party Computation for
                  Machine Learning},
  booktitle    = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {496--511},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSP.2019.00043},
  doi          = {10.1109/EUROSP.2019.00043},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosp/ChandranGRST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-07814,
  author       = {Nishant Kumar and
                  Mayank Rathee and
                  Nishanth Chandran and
                  Divya Gupta and
                  Aseem Rastogi and
                  Rahul Sharma},
  title        = {CrypTFlow: Secure TensorFlow Inference},
  journal      = {CoRR},
  volume       = {abs/1909.07814},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.07814},
  eprinttype    = {arXiv},
  eprint       = {1909.07814},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-07814.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KumarRCGRS19,
  author       = {Nishant Kumar and
                  Mayank Rathee and
                  Nishanth Chandran and
                  Divya Gupta and
                  Aseem Rastogi and
                  Rahul Sharma},
  title        = {CrypTFlow: Secure TensorFlow Inference},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1049},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1049},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KumarRCGRS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/0001MW18,
  author       = {Divya Gupta and
                  Hemanta K. Maji and
                  Mingyuan Wang},
  editor       = {Debrup Chakraborty and
                  Tetsu Iwata},
  title        = {Non-malleable Codes Against Lookahead Tampering},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2018 - 19th International Conference
                  on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11356},
  pages        = {307--328},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05378-9\_17},
  doi          = {10.1007/978-3-030-05378-9\_17},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/0001MW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/DottlingG0MM18,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Divya Gupta and
                  Peihan Miao and
                  Pratyay Mukherjee},
  editor       = {Debrup Chakraborty and
                  Tetsu Iwata},
  title        = {Obfuscation from Low Noise Multilinear Maps},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2018 - 19th International Conference
                  on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11356},
  pages        = {329--352},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05378-9\_18},
  doi          = {10.1007/978-3-030-05378-9\_18},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/DottlingG0MM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Block0MN18,
  author       = {Alexander R. Block and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Hai H. Nguyen},
  editor       = {Amos Beimel and
                  Stefan Dziembowski},
  title        = {Secure Computation Using Leaky Correlations (Asymptotically Optimal
                  Constructions)},
  booktitle    = {Theory of Cryptography - 16th International Conference, {TCC} 2018,
                  Panaji, India, November 11-14, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11240},
  pages        = {36--65},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03810-6\_2},
  doi          = {10.1007/978-3-030-03810-6\_2},
  timestamp    = {Sat, 09 Apr 2022 12:44:08 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Block0MN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlockGMN18,
  author       = {Alexander R. Block and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Hai H. Nguyen},
  title        = {Secure Computation using Leaky Correlations (Asymptotically Optimal
                  Constructions)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {372},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/372},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlockGMN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WaghGC18,
  author       = {Sameer Wagh and
                  Divya Gupta and
                  Nishanth Chandran},
  title        = {SecureNN: Efficient and Private Neural Network Training},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {442},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/442},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/WaghGC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/ChoDG0MP17,
  author       = {Chongwon Cho and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Divya Gupta and
                  Peihan Miao and
                  Antigoni Polychroniadou},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Laconic Oblivious Transfer and Its Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {33--65},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_2},
  doi          = {10.1007/978-3-319-63715-0\_2},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/ChoDG0MP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoDG0MP17,
  author       = {Chongwon Cho and
                  Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Divya Gupta and
                  Peihan Miao and
                  Antigoni Polychroniadou},
  title        = {Laconic Oblivious Transfer and its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {491},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/491},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoDG0MP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001MW17,
  author       = {Divya Gupta and
                  Hemanta K. Maji and
                  Mingyuan Wang},
  title        = {Constant-rate Non-malleable Codes in the Split-state Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1048},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1048},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/0001MW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranGRST17,
  author       = {Nishanth Chandran and
                  Divya Gupta and
                  Aseem Rastogi and
                  Rahul Sharma and
                  Shardul Tripathi},
  title        = {EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1109},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1109},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranGRST17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/basesearch/Gupta16,
  author       = {Divya Gupta},
  title        = {Program Obfuscation: Applications and Optimizations},
  school       = {University of California, Los Angeles, {USA}},
  year         = {2016},
  url          = {http://www.escholarship.org/uc/item/75q380wk},
  timestamp    = {Mon, 15 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/basesearch/Gupta16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AggarwalA0MPP16,
  author       = {Divesh Aggarwal and
                  Shashank Agrawal and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Omkant Pandey and
                  Manoj Prabhakaran},
  editor       = {Eyal Kushilevitz and
                  Tal Malkin},
  title        = {Optimal Computational Split-state Non-malleable Codes},
  booktitle    = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A,
                  Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9563},
  pages        = {393--417},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49099-0\_15},
  doi          = {10.1007/978-3-662-49099-0\_15},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/AggarwalA0MPP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Garg0MP16,
  author       = {Sanjam Garg and
                  Divya Gupta and
                  Peihan Miao and
                  Omkant Pandey},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {Secure Multiparty {RAM} Computation in Constant Rounds},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9985},
  pages        = {491--520},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53641-4\_19},
  doi          = {10.1007/978-3-662-53641-4\_19},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Garg0MP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingG0MM16,
  author       = {Nico D{\"{o}}ttling and
                  Sanjam Garg and
                  Divya Gupta and
                  Peihan Miao and
                  Pratyay Mukherjee},
  title        = {Obfuscation from Low Noise Multilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {599},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/599},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingG0MM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Garg0MP16,
  author       = {Sanjam Garg and
                  Divya Gupta and
                  Peihan Miao and
                  Omkant Pandey},
  title        = {Secure Multiparty {RAM} Computation in Constant Rounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {815},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/815},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Garg0MP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Badrinarayanan015,
  author       = {Saikrishna Badrinarayanan and
                  Divya Gupta and
                  Abhishek Jain and
                  Amit Sahai},
  editor       = {Tetsu Iwata and
                  Jung Hee Cheon},
  title        = {Multi-input Functional Encryption for Unbounded Arity Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9452},
  pages        = {27--51},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48797-6\_2},
  doi          = {10.1007/978-3-662-48797-6\_2},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Badrinarayanan015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Goyal0S15,
  author       = {Vipul Goyal and
                  Divya Gupta and
                  Amit Sahai},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Concurrent Secure Computation via Non-Black Box Simulation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {23--42},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_2},
  doi          = {10.1007/978-3-662-48000-7\_2},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Goyal0S15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Agrawal0MPP15,
  author       = {Shashank Agrawal and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Omkant Pandey and
                  Manoj Prabhakaran},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9215},
  pages        = {538--557},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-47989-6\_26},
  doi          = {10.1007/978-3-662-47989-6\_26},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Agrawal0MPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/0001IMS15,
  author       = {Divya Gupta and
                  Yuval Ishai and
                  Hemanta K. Maji and
                  Amit Sahai},
  editor       = {Rosario Gennaro and
                  Matthew Robshaw},
  title        = {Secure Computation from Leaky Correlated Randomness},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9216},
  pages        = {701--720},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48000-7\_34},
  doi          = {10.1007/978-3-662-48000-7\_34},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/0001IMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Boneh0MS15,
  author       = {Dan Boneh and
                  Divya Gupta and
                  Ilya Mironov and
                  Amit Sahai},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {Hosting Services on an Untrusted Cloud},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9057},
  pages        = {404--436},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46803-6\_14},
  doi          = {10.1007/978-3-662-46803-6\_14},
  timestamp    = {Thu, 14 Oct 2021 09:58:15 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Boneh0MS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Agrawal0MPP15,
  author       = {Shashank Agrawal and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Omkant Pandey and
                  Manoj Prabhakaran},
  editor       = {Yevgeniy Dodis and
                  Jesper Buus Nielsen},
  title        = {A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise
                  Tampering and Permutations},
  booktitle    = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
                  2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9014},
  pages        = {375--397},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46494-6\_16},
  doi          = {10.1007/978-3-662-46494-6\_16},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/Agrawal0MPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Goyal0015,
  author       = {Vipul Goyal and
                  Divya Gupta and
                  Abhishek Jain},
  title        = {What Information is Leaked under Concurrent Composition?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {420},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/420},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Goyal0015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AggarwalA0MPP15,
  author       = {Divesh Aggarwal and
                  Shashank Agrawal and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Omkant Pandey and
                  Manoj Prabhakaran},
  title        = {Optimal Computational Split-state Non-malleable Codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1063},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1063},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AggarwalA0MPP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Goyal0S15,
  author       = {Vipul Goyal and
                  Divya Gupta and
                  Amit Sahai},
  title        = {Concurrent Secure Computation via Non-Black Box Simulation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1107},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Goyal0S15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Badrinarayanan015,
  author       = {Saikrishna Badrinarayanan and
                  Divya Gupta and
                  Abhishek Jain and
                  Amit Sahai},
  title        = {Multi-Input Functional Encryption for Unbounded Arity Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1136},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1136},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Badrinarayanan015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AnanthGIS14,
  author       = {Prabhanjan Vijendra Ananth and
                  Divya Gupta and
                  Yuval Ishai and
                  Amit Sahai},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {Optimizing Obfuscation: Avoiding Barrington's Theorem},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {646--658},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660342},
  doi          = {10.1145/2660267.2660342},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AnanthGIS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GargG14,
  author       = {Sanjam Garg and
                  Divya Gupta},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Efficient Round Optimal Blind Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {477--495},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_27},
  doi          = {10.1007/978-3-642-55220-5\_27},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GargG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/GuptaS14,
  author       = {Divya Gupta and
                  Amit Sahai},
  editor       = {Willi Meier and
                  Debdeep Mukhopadhyay},
  title        = {On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
                  on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8885},
  pages        = {71--88},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13039-2\_5},
  doi          = {10.1007/978-3-319-13039-2\_5},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/GuptaS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eccc/AgrawalGMPP14,
  author       = {Shashank Agrawal and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Omkant Pandey and
                  Manoj Prabhakaran},
  title        = {Explicit Non-Malleable Codes Resistant to Permutations},
  journal      = {Electron. Colloquium Comput. Complex.},
  volume       = {{TR14-069}},
  year         = {2014},
  url          = {https://eccc.weizmann.ac.il/report/2014/069},
  eprinttype    = {ECCC},
  eprint       = {TR14-069},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eccc/AgrawalGMPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GargG14,
  author       = {Sanjam Garg and
                  Divya Gupta},
  title        = {Efficient Round Optimal Blind Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {81},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/081},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GargG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AnanthGIS14,
  author       = {Prabhanjan Ananth and
                  Divya Gupta and
                  Yuval Ishai and
                  Amit Sahai},
  title        = {Optimizing Obfuscation: Avoiding Barrington's Theorem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {222},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/222},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AnanthGIS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalGMPP14,
  author       = {Shashank Agrawal and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Omkant Pandey and
                  Manoj Prabhakaran},
  title        = {Explicit Non-Malleable Codes Resistant to Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/316},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalGMPP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalGMPP14a,
  author       = {Shashank Agrawal and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Omkant Pandey and
                  Manoj Prabhakaran},
  title        = {Explicit Non-malleable Codes Resistant to Permutations and Perturbations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {841},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/841},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalGMPP14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalGMPP14b,
  author       = {Shashank Agrawal and
                  Divya Gupta and
                  Hemanta K. Maji and
                  Omkant Pandey and
                  Manoj Prabhakaran},
  title        = {Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering
                  and Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {842},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/842},
  timestamp    = {Wed, 17 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalGMPP14b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GoyalG013,
  author       = {Vipul Goyal and
                  Divya Gupta and
                  Abhishek Jain},
  editor       = {Ran Canetti and
                  Juan A. Garay},
  title        = {What Information Is Leaked under Concurrent Composition?},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8043},
  pages        = {220--238},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40084-1\_13},
  doi          = {10.1007/978-3-642-40084-1\_13},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GoyalG013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/ElbassioniGGKN12,
  author       = {Khaled M. Elbassioni and
                  Naveen Garg and
                  Divya Gupta and
                  Amit Kumar and
                  Vishal Narula and
                  Arindam Pal},
  editor       = {Deepak D'Souza and
                  Telikepalli Kavitha and
                  Jaikumar Radhakrishnan},
  title        = {Approximation Algorithms for the Unsplittable Flow Problem on Paths
                  and Trees},
  booktitle    = {{IARCS} Annual Conference on Foundations of Software Technology and
                  Theoretical Computer Science, {FSTTCS} 2012, December 15-17, 2012,
                  Hyderabad, India},
  series       = {LIPIcs},
  volume       = {18},
  pages        = {267--275},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2012},
  url          = {https://doi.org/10.4230/LIPIcs.FSTTCS.2012.267},
  doi          = {10.4230/LIPICS.FSTTCS.2012.267},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/ElbassioniGGKN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-3719,
  author       = {Divya Gupta and
                  Amit Sahai},
  title        = {On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption},
  journal      = {CoRR},
  volume       = {abs/1210.3719},
  year         = {2012},
  url          = {http://arxiv.org/abs/1210.3719},
  eprinttype    = {arXiv},
  eprint       = {1210.3719},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1210-3719.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuptaS12,
  author       = {Divya Gupta and
                  Amit Sahai},
  title        = {On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {572},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/572},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuptaS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics