Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Divya Gupta 0001
@article{DBLP:journals/corr/abs-2402-18386, author = {Rohit Dwivedula and Sriram Sridhar and Sambhav Satija and Muthian Sivathanu and Nishanth Chandran and Divya Gupta and Satya Lokam}, title = {TrustRate: {A} Decentralized Platform for Hijack-Resistant Anonymous Reviews}, journal = {CoRR}, volume = {abs/2402.18386}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.18386}, doi = {10.48550/ARXIV.2402.18386}, eprinttype = {arXiv}, eprint = {2402.18386}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-18386.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-00393, author = {Nishanth Chandran and Sunayana Sitaram and Divya Gupta and Rahul Sharma and Kashish Mittal and Manohar Swaminathan}, title = {Private Benchmarking to Prevent Contamination and Improve Comparative Evaluation of LLMs}, journal = {CoRR}, volume = {abs/2403.00393}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.00393}, doi = {10.48550/ARXIV.2403.00393}, eprinttype = {arXiv}, eprint = {2403.00393}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-00393.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/GuptaRBGSCS23, author = {Gauri Gupta and Krithika Ramesh and Anwesh Bhattacharya and Divya Gupta and Rahul Sharma and Nishanth Chandran and Rijurekha Sen}, title = {End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2023}, number = {4}, pages = {436--451}, year = {2023}, url = {https://doi.org/10.56553/popets-2023-0118}, doi = {10.56553/POPETS-2023-0118}, timestamp = {Thu, 17 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/GuptaRBGSCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/RatheeB00S23, author = {Deevashwer Rathee and Anwesh Bhattacharya and Divya Gupta and Rahul Sharma and Dawn Song}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Secure Floating-Point Training}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {6329--6346}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/rathee}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/RatheeB00S23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-05686, author = {Ananta Mukherjee and Peeyush Kumar and Boling Yang and Nishanth Chandran and Divya Gupta}, title = {Privacy Preserving Multi-Agent Reinforcement Learning in Supply Chains}, journal = {CoRR}, volume = {abs/2312.05686}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.05686}, doi = {10.48550/ARXIV.2312.05686}, eprinttype = {arXiv}, eprint = {2312.05686}, timestamp = {Wed, 03 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-05686.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JawalkarGBCGS23, author = {Neha Jawalkar and Kanav Gupta and Arkaprava Basu and Nishanth Chandran and Divya Gupta and Rahul Sharma}, title = {Orca: FSS-based Secure Training with GPUs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {206}, year = {2023}, url = {https://eprint.iacr.org/2023/206}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JawalkarGBCGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RatheeBGSS23, author = {Deevashwer Rathee and Anwesh Bhattacharya and Divya Gupta and Rahul Sharma and Dawn Song}, title = {Secure Floating-Point Training}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {467}, year = {2023}, url = {https://eprint.iacr.org/2023/467}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RatheeBGSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuptaRB00CS23, author = {Gauri Gupta and Krithika Ramesh and Anwesh Bhattacharya and Divya Gupta and Rahul Sharma and Nishanth Chandran and Rijurekha Sen}, title = {End-to-end Privacy Preserving Training and Inference for Air Pollution Forecasting with Data from Rival Fleets}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1010}, year = {2023}, url = {https://eprint.iacr.org/2023/1010}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuptaRB00CS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuptaJMCGPS23, author = {Kanav Gupta and Neha Jawalkar and Ananta Mukherjee and Nishanth Chandran and Divya Gupta and Ashish Panwar and Rahul Sharma}, title = {{SIGMA:} Secure {GPT} Inference with Function Secret Sharing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1269}, year = {2023}, url = {https://eprint.iacr.org/2023/1269}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuptaJMCGPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/ChandranGS22, author = {Nishanth Chandran and Divya Gupta and Akash Shah}, title = {Circuit-PSI With Linear Complexity via Relaxed Batch {OPPRF}}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {1}, pages = {353--372}, year = {2022}, url = {https://doi.org/10.2478/popets-2022-0018}, doi = {10.2478/POPETS-2022-0018}, timestamp = {Mon, 06 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/ChandranGS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/GuptaKCG22, author = {Kanav Gupta and Deepak Kumaraswamy and Nishanth Chandran and Divya Gupta}, title = {{LLAMA:} {A} Low Latency Math Library for Secure Inference}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {4}, pages = {274--294}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0109}, doi = {10.56553/POPETS-2022-0109}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/GuptaKCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RatheeB00CR22, author = {Deevashwer Rathee and Anwesh Bhattacharya and Rahul Sharma and Divya Gupta and Nishanth Chandran and Aseem Rastogi}, title = {SecFloat: Accurate Floating-Point meets Secure 2-Party Computation}, booktitle = {43rd {IEEE} Symposium on Security and Privacy, {SP} 2022, San Francisco, CA, USA, May 22-26, 2022}, pages = {576--595}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SP46214.2022.9833697}, doi = {10.1109/SP46214.2022.9833697}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/RatheeB00CR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Chandran0OS22, author = {Nishanth Chandran and Divya Gupta and Sai Lakshmi Bhavana Obbattu and Akash Shah}, editor = {Kevin R. B. Butler and Kurt Thomas}, title = {{SIMC:} {ML} Inference Secure Against Malicious Clients at Semi-Honest Cost}, booktitle = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston, MA, USA, August 10-12, 2022}, pages = {1361--1378}, publisher = {{USENIX} Association}, year = {2022}, url = {https://www.usenix.org/conference/usenixsecurity22/presentation/chandran}, timestamp = {Tue, 18 Oct 2022 17:10:36 +0200}, biburl = {https://dblp.org/rec/conf/uss/Chandran0OS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-00411, author = {Vinod Ganesan and Anwesh Bhattacharya and Pratyush Kumar and Divya Gupta and Rahul Sharma and Nishanth Chandran}, title = {Efficient {ML} Models for Practical Secure Inference}, journal = {CoRR}, volume = {abs/2209.00411}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.00411}, doi = {10.48550/ARXIV.2209.00411}, eprinttype = {arXiv}, eprint = {2209.00411}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-00411.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RatheeBSGCR22, author = {Deevashwer Rathee and Anwesh Bhattacharya and Rahul Sharma and Divya Gupta and Nishanth Chandran and Aseem Rastogi}, title = {SecFloat: Accurate Floating-Point meets Secure 2-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {322}, year = {2022}, url = {https://eprint.iacr.org/2022/322}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/RatheeBSGCR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuptaKC022, author = {Kanav Gupta and Deepak Kumaraswamy and Nishanth Chandran and Divya Gupta}, title = {{LLAMA:} {A} Low Latency Math Library for Secure Inference}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {793}, year = {2022}, url = {https://eprint.iacr.org/2022/793}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuptaKC022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ChandranD0OSS21, author = {Nishanth Chandran and Nishka Dasgupta and Divya Gupta and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar and Akash Shah}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Efficient Linear Multiparty {PSI} and Extensions to Circuit/Quorum {PSI}}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {1182--1204}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484591}, doi = {10.1145/3460120.3484591}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ChandranD0OSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccsw-ws/ShahCD0GY21, author = {Akash Shah and Nishanth Chandran and Mesfin Dema and Divya Gupta and Arun Gururajan and Huan Yu}, editor = {Yinqian Zhang and Marten van Dijk}, title = {Secure Featurization and Applications to Secure Phishing Detection}, booktitle = {CCSW@CCS '21: Proceedings of the 2021 on Cloud Computing Security Workshop, Virtual Event, Republic of Korea, 15 November 2021}, pages = {83--95}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474123.3486759}, doi = {10.1145/3474123.3486759}, timestamp = {Thu, 12 Oct 2023 12:32:07 +0200}, biburl = {https://dblp.org/rec/conf/ccsw-ws/ShahCD0GY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyleCG0I0R21, author = {Elette Boyle and Nishanth Chandran and Niv Gilboa and Divya Gupta and Yuval Ishai and Nishant Kumar and Mayank Rathee}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12697}, pages = {871--900}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77886-6\_30}, doi = {10.1007/978-3-030-77886-6\_30}, timestamp = {Mon, 28 Aug 2023 21:17:52 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyleCG0I0R21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/RatheeRGGSCR21, author = {Deevashwer Rathee and Mayank Rathee and Rahul Kranti Kiran Goli and Divya Gupta and Rahul Sharma and Nishanth Chandran and Aseem Rastogi}, title = {SiRnn: {A} Math Library for Secure {RNN} Inference}, booktitle = {42nd {IEEE} Symposium on Security and Privacy, {SP} 2021, San Francisco, CA, USA, 24-27 May 2021}, pages = {1003--1020}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SP40001.2021.00086}, doi = {10.1109/SP40001.2021.00086}, timestamp = {Thu, 21 Sep 2023 15:57:26 +0200}, biburl = {https://dblp.org/rec/conf/sp/RatheeRGGSCR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-04236, author = {Deevashwer Rathee and Mayank Rathee and Rahul Kranti Kiran Goli and Divya Gupta and Rahul Sharma and Nishanth Chandran and Aseem Rastogi}, title = {{SIRNN:} {A} Math Library for Secure {RNN} Inference}, journal = {CoRR}, volume = {abs/2105.04236}, year = {2021}, url = {https://arxiv.org/abs/2105.04236}, eprinttype = {arXiv}, eprint = {2105.04236}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-04236.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-10230, author = {Arjun Soin and Pratik Bhatu and Rohit Takhar and Nishanth Chandran and Divya Gupta and Javier Alvarez{-}Valle and Rahul Sharma and Vidur Mahajan and Matthew P. Lungren}, title = {Production-level Open Source Privacy Preserving Inference in Medical Imaging}, journal = {CoRR}, volume = {abs/2107.10230}, year = {2021}, url = {https://arxiv.org/abs/2107.10230}, eprinttype = {arXiv}, eprint = {2107.10230}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-10230.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranGS21, author = {Nishanth Chandran and Divya Gupta and Akash Shah}, title = {Circuit-PSI with Linear Complexity via Relaxed Batch {OPPRF}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {34}, year = {2021}, url = {https://eprint.iacr.org/2021/034}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChandranGS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranDGOSS21, author = {Nishanth Chandran and Nishka Dasgupta and Divya Gupta and Sai Lakshmi Bhavana Obbattu and Sruthi Sekar and Akash Shah}, title = {Efficient Linear Multiparty {PSI} and Extensions to Circuit/Quorum {PSI}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {172}, year = {2021}, url = {https://eprint.iacr.org/2021/172}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChandranDGOSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RatheeRKGSCR21, author = {Deevashwer Rathee and Mayank Rathee and G. Rahul Kranti Kiran and Divya Gupta and Rahul Sharma and Nishanth Chandran and Aseem Rastogi}, title = {{SIRNN:} {A} Math Library for Secure {RNN} Inference}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {459}, year = {2021}, url = {https://eprint.iacr.org/2021/459}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RatheeRKGSCR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShahCDGGY21, author = {Akash Shah and Nishanth Chandran and Mesfin Dema and Divya Gupta and Arun Gururajan and Huan Yu}, title = {Secure Featurization and Applications to Secure Phishing Detection}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1448}, year = {2021}, url = {https://eprint.iacr.org/2021/1448}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ShahCDGGY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranGOS21, author = {Nishanth Chandran and Divya Gupta and Sai Lakshmi Bhavana Obbattu and Akash Shah}, title = {{SIMC:} {ML} Inference Secure Against Malicious Clients at Semi-Honest Cost}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1538}, year = {2021}, url = {https://eprint.iacr.org/2021/1538}, timestamp = {Fri, 10 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChandranGOS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RatheeR0CGR020, author = {Deevashwer Rathee and Mayank Rathee and Nishant Kumar and Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma}, editor = {Jay Ligatti and Xinming Ou and Jonathan Katz and Giovanni Vigna}, title = {CrypTFlow2: Practical 2-Party Secure Inference}, booktitle = {{CCS} '20: 2020 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020}, pages = {325--342}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3372297.3417274}, doi = {10.1145/3372297.3417274}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RatheeR0CGR020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/osdi/SatijaMSGSCGL20, author = {Sambhav Satija and Apurv Mehra and Sudheesh Singanamalla and Karan Grover and Muthian Sivathanu and Nishanth Chandran and Divya Gupta and Satya Lokam}, title = {Blockene: {A} High-throughput Blockchain Over Mobile Devices}, booktitle = {14th {USENIX} Symposium on Operating Systems Design and Implementation, {OSDI} 2020, Virtual Event, November 4-6, 2020}, pages = {567--582}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/osdi20/presentation/satija}, timestamp = {Tue, 02 Feb 2021 08:05:52 +0100}, biburl = {https://dblp.org/rec/conf/osdi/SatijaMSGSCGL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/0001RCGR020, author = {Nishant Kumar and Mayank Rathee and Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma}, title = {CrypTFlow: Secure TensorFlow Inference}, booktitle = {2020 {IEEE} Symposium on Security and Privacy, {SP} 2020, San Francisco, CA, USA, May 18-21, 2020}, pages = {336--353}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/SP40000.2020.00092}, doi = {10.1109/SP40000.2020.00092}, timestamp = {Thu, 21 Sep 2023 15:57:24 +0200}, biburl = {https://dblp.org/rec/conf/sp/0001RCGR020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-06457, author = {Deevashwer Rathee and Mayank Rathee and Nishant Kumar and Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma}, title = {CrypTFlow2: Practical 2-Party Secure Inference}, journal = {CoRR}, volume = {abs/2010.06457}, year = {2020}, url = {https://arxiv.org/abs/2010.06457}, eprinttype = {arXiv}, eprint = {2010.06457}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-06457.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-07277, author = {Sambhav Satija and Apurv Mehra and Sudheesh Singanamalla and Karan Grover and Muthian Sivathanu and Nishanth Chandran and Divya Gupta and Satya Lokam}, title = {Blockene: {A} High-throughput Blockchain Over Mobile Devices}, journal = {CoRR}, volume = {abs/2010.07277}, year = {2020}, url = {https://arxiv.org/abs/2010.07277}, eprinttype = {arXiv}, eprint = {2010.07277}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-07277.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-05064, author = {Javier Alvarez{-}Valle and Pratik Bhatu and Nishanth Chandran and Divya Gupta and Aditya V. Nori and Aseem Rastogi and Mayank Rathee and Rahul Sharma and Shubham Ugare}, title = {Secure Medical Image Analysis with CrypTFlow}, journal = {CoRR}, volume = {abs/2012.05064}, year = {2020}, url = {https://arxiv.org/abs/2012.05064}, eprinttype = {arXiv}, eprint = {2012.05064}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-05064.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RatheeRKCGRS20, author = {Deevashwer Rathee and Mayank Rathee and Nishant Kumar and Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma}, title = {CrypTFlow2: Practical 2-Party Secure Inference}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1002}, year = {2020}, url = {https://eprint.iacr.org/2020/1002}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/RatheeRKCGRS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyleCGGIKR20, author = {Elette Boyle and Nishanth Chandran and Niv Gilboa and Divya Gupta and Yuval Ishai and Nishant Kumar and Mayank Rathee}, title = {Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1392}, year = {2020}, url = {https://eprint.iacr.org/2020/1392}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BoyleCGGIKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/WaghGC19, author = {Sameer Wagh and Divya Gupta and Nishanth Chandran}, title = {SecureNN: 3-Party Secure Computation for Neural Network Training}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2019}, number = {3}, pages = {26--49}, year = {2019}, url = {https://doi.org/10.2478/popets-2019-0035}, doi = {10.2478/POPETS-2019-0035}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/popets/WaghGC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0001MW19, author = {Divya Gupta and Hemanta K. Maji and Mingyuan Wang}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Explicit Rate-1 Non-malleable Codes for Local Tampering}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {435--466}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_16}, doi = {10.1007/978-3-030-26948-7\_16}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/0001MW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/ChandranGRST19, author = {Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma and Shardul Tripathi}, title = {EzPC: Programmable and Efficient Secure Two-Party Computation for Machine Learning}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {496--511}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSP.2019.00043}, doi = {10.1109/EUROSP.2019.00043}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/ChandranGRST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-07814, author = {Nishant Kumar and Mayank Rathee and Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma}, title = {CrypTFlow: Secure TensorFlow Inference}, journal = {CoRR}, volume = {abs/1909.07814}, year = {2019}, url = {http://arxiv.org/abs/1909.07814}, eprinttype = {arXiv}, eprint = {1909.07814}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-07814.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KumarRCGRS19, author = {Nishant Kumar and Mayank Rathee and Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma}, title = {CrypTFlow: Secure TensorFlow Inference}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1049}, year = {2019}, url = {https://eprint.iacr.org/2019/1049}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KumarRCGRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/0001MW18, author = {Divya Gupta and Hemanta K. Maji and Mingyuan Wang}, editor = {Debrup Chakraborty and Tetsu Iwata}, title = {Non-malleable Codes Against Lookahead Tampering}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2018 - 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11356}, pages = {307--328}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05378-9\_17}, doi = {10.1007/978-3-030-05378-9\_17}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/0001MW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/DottlingG0MM18, author = {Nico D{\"{o}}ttling and Sanjam Garg and Divya Gupta and Peihan Miao and Pratyay Mukherjee}, editor = {Debrup Chakraborty and Tetsu Iwata}, title = {Obfuscation from Low Noise Multilinear Maps}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2018 - 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11356}, pages = {329--352}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05378-9\_18}, doi = {10.1007/978-3-030-05378-9\_18}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/DottlingG0MM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Block0MN18, author = {Alexander R. Block and Divya Gupta and Hemanta K. Maji and Hai H. Nguyen}, editor = {Amos Beimel and Stefan Dziembowski}, title = {Secure Computation Using Leaky Correlations (Asymptotically Optimal Constructions)}, booktitle = {Theory of Cryptography - 16th International Conference, {TCC} 2018, Panaji, India, November 11-14, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11240}, pages = {36--65}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03810-6\_2}, doi = {10.1007/978-3-030-03810-6\_2}, timestamp = {Sat, 09 Apr 2022 12:44:08 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Block0MN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlockGMN18, author = {Alexander R. Block and Divya Gupta and Hemanta K. Maji and Hai H. Nguyen}, title = {Secure Computation using Leaky Correlations (Asymptotically Optimal Constructions)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {372}, year = {2018}, url = {https://eprint.iacr.org/2018/372}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlockGMN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WaghGC18, author = {Sameer Wagh and Divya Gupta and Nishanth Chandran}, title = {SecureNN: Efficient and Private Neural Network Training}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {442}, year = {2018}, url = {https://eprint.iacr.org/2018/442}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/WaghGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/ChoDG0MP17, author = {Chongwon Cho and Nico D{\"{o}}ttling and Sanjam Garg and Divya Gupta and Peihan Miao and Antigoni Polychroniadou}, editor = {Jonathan Katz and Hovav Shacham}, title = {Laconic Oblivious Transfer and Its Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {33--65}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_2}, doi = {10.1007/978-3-319-63715-0\_2}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/ChoDG0MP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoDG0MP17, author = {Chongwon Cho and Nico D{\"{o}}ttling and Sanjam Garg and Divya Gupta and Peihan Miao and Antigoni Polychroniadou}, title = {Laconic Oblivious Transfer and its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {491}, year = {2017}, url = {http://eprint.iacr.org/2017/491}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoDG0MP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001MW17, author = {Divya Gupta and Hemanta K. Maji and Mingyuan Wang}, title = {Constant-rate Non-malleable Codes in the Split-state Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1048}, year = {2017}, url = {http://eprint.iacr.org/2017/1048}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/0001MW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranGRST17, author = {Nishanth Chandran and Divya Gupta and Aseem Rastogi and Rahul Sharma and Shardul Tripathi}, title = {EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1109}, year = {2017}, url = {http://eprint.iacr.org/2017/1109}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChandranGRST17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/basesearch/Gupta16, author = {Divya Gupta}, title = {Program Obfuscation: Applications and Optimizations}, school = {University of California, Los Angeles, {USA}}, year = {2016}, url = {http://www.escholarship.org/uc/item/75q380wk}, timestamp = {Mon, 15 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/basesearch/Gupta16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AggarwalA0MPP16, author = {Divesh Aggarwal and Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, editor = {Eyal Kushilevitz and Tal Malkin}, title = {Optimal Computational Split-state Non-malleable Codes}, booktitle = {Theory of Cryptography - 13th International Conference, {TCC} 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9563}, pages = {393--417}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49099-0\_15}, doi = {10.1007/978-3-662-49099-0\_15}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/AggarwalA0MPP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Garg0MP16, author = {Sanjam Garg and Divya Gupta and Peihan Miao and Omkant Pandey}, editor = {Martin Hirt and Adam D. Smith}, title = {Secure Multiparty {RAM} Computation in Constant Rounds}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9985}, pages = {491--520}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53641-4\_19}, doi = {10.1007/978-3-662-53641-4\_19}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Garg0MP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingG0MM16, author = {Nico D{\"{o}}ttling and Sanjam Garg and Divya Gupta and Peihan Miao and Pratyay Mukherjee}, title = {Obfuscation from Low Noise Multilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {599}, year = {2016}, url = {http://eprint.iacr.org/2016/599}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingG0MM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Garg0MP16, author = {Sanjam Garg and Divya Gupta and Peihan Miao and Omkant Pandey}, title = {Secure Multiparty {RAM} Computation in Constant Rounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {815}, year = {2016}, url = {http://eprint.iacr.org/2016/815}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Garg0MP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Badrinarayanan015, author = {Saikrishna Badrinarayanan and Divya Gupta and Abhishek Jain and Amit Sahai}, editor = {Tetsu Iwata and Jung Hee Cheon}, title = {Multi-input Functional Encryption for Unbounded Arity Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9452}, pages = {27--51}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48797-6\_2}, doi = {10.1007/978-3-662-48797-6\_2}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Badrinarayanan015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Goyal0S15, author = {Vipul Goyal and Divya Gupta and Amit Sahai}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Concurrent Secure Computation via Non-Black Box Simulation}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {23--42}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_2}, doi = {10.1007/978-3-662-48000-7\_2}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Goyal0S15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Agrawal0MPP15, author = {Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Explicit Non-malleable Codes Against Bit-Wise Tampering and Permutations}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, pages = {538--557}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6\_26}, doi = {10.1007/978-3-662-47989-6\_26}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Agrawal0MPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/0001IMS15, author = {Divya Gupta and Yuval Ishai and Hemanta K. Maji and Amit Sahai}, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Secure Computation from Leaky Correlated Randomness}, booktitle = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, pages = {701--720}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7\_34}, doi = {10.1007/978-3-662-48000-7\_34}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/0001IMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Boneh0MS15, author = {Dan Boneh and Divya Gupta and Ilya Mironov and Amit Sahai}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {Hosting Services on an Untrusted Cloud}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9057}, pages = {404--436}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46803-6\_14}, doi = {10.1007/978-3-662-46803-6\_14}, timestamp = {Thu, 14 Oct 2021 09:58:15 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Boneh0MS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Agrawal0MPP15, author = {Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, editor = {Yevgeniy Dodis and Jesper Buus Nielsen}, title = {A Rate-Optimizing Compiler for Non-malleable Codes Against Bit-Wise Tampering and Permutations}, booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC} 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9014}, pages = {375--397}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46494-6\_16}, doi = {10.1007/978-3-662-46494-6\_16}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Agrawal0MPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goyal0015, author = {Vipul Goyal and Divya Gupta and Abhishek Jain}, title = {What Information is Leaked under Concurrent Composition?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {420}, year = {2015}, url = {http://eprint.iacr.org/2015/420}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goyal0015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AggarwalA0MPP15, author = {Divesh Aggarwal and Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, title = {Optimal Computational Split-state Non-malleable Codes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1063}, year = {2015}, url = {http://eprint.iacr.org/2015/1063}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AggarwalA0MPP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Goyal0S15, author = {Vipul Goyal and Divya Gupta and Amit Sahai}, title = {Concurrent Secure Computation via Non-Black Box Simulation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1107}, year = {2015}, url = {http://eprint.iacr.org/2015/1107}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Goyal0S15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Badrinarayanan015, author = {Saikrishna Badrinarayanan and Divya Gupta and Abhishek Jain and Amit Sahai}, title = {Multi-Input Functional Encryption for Unbounded Arity Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1136}, year = {2015}, url = {http://eprint.iacr.org/2015/1136}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Badrinarayanan015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AnanthGIS14, author = {Prabhanjan Vijendra Ananth and Divya Gupta and Yuval Ishai and Amit Sahai}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {Optimizing Obfuscation: Avoiding Barrington's Theorem}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {646--658}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660342}, doi = {10.1145/2660267.2660342}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AnanthGIS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GargG14, author = {Sanjam Garg and Divya Gupta}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Efficient Round Optimal Blind Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {477--495}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_27}, doi = {10.1007/978-3-642-55220-5\_27}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GargG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/GuptaS14, author = {Divya Gupta and Amit Sahai}, editor = {Willi Meier and Debdeep Mukhopadhyay}, title = {On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8885}, pages = {71--88}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13039-2\_5}, doi = {10.1007/978-3-319-13039-2\_5}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/GuptaS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eccc/AgrawalGMPP14, author = {Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, title = {Explicit Non-Malleable Codes Resistant to Permutations}, journal = {Electron. Colloquium Comput. Complex.}, volume = {{TR14-069}}, year = {2014}, url = {https://eccc.weizmann.ac.il/report/2014/069}, eprinttype = {ECCC}, eprint = {TR14-069}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eccc/AgrawalGMPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GargG14, author = {Sanjam Garg and Divya Gupta}, title = {Efficient Round Optimal Blind Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {81}, year = {2014}, url = {http://eprint.iacr.org/2014/081}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GargG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AnanthGIS14, author = {Prabhanjan Ananth and Divya Gupta and Yuval Ishai and Amit Sahai}, title = {Optimizing Obfuscation: Avoiding Barrington's Theorem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {222}, year = {2014}, url = {http://eprint.iacr.org/2014/222}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AnanthGIS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalGMPP14, author = {Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, title = {Explicit Non-Malleable Codes Resistant to Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2014}, url = {http://eprint.iacr.org/2014/316}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalGMPP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalGMPP14a, author = {Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, title = {Explicit Non-malleable Codes Resistant to Permutations and Perturbations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {841}, year = {2014}, url = {http://eprint.iacr.org/2014/841}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalGMPP14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalGMPP14b, author = {Shashank Agrawal and Divya Gupta and Hemanta K. Maji and Omkant Pandey and Manoj Prabhakaran}, title = {Explicit Optimal-Rate Non-malleable Codes Against Bit-wise Tampering and Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {842}, year = {2014}, url = {http://eprint.iacr.org/2014/842}, timestamp = {Wed, 17 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalGMPP14b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/GoyalG013, author = {Vipul Goyal and Divya Gupta and Abhishek Jain}, editor = {Ran Canetti and Juan A. Garay}, title = {What Information Is Leaked under Concurrent Composition?}, booktitle = {Advances in Cryptology - {CRYPTO} 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8043}, pages = {220--238}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40084-1\_13}, doi = {10.1007/978-3-642-40084-1\_13}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/GoyalG013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/ElbassioniGGKN12, author = {Khaled M. Elbassioni and Naveen Garg and Divya Gupta and Amit Kumar and Vishal Narula and Arindam Pal}, editor = {Deepak D'Souza and Telikepalli Kavitha and Jaikumar Radhakrishnan}, title = {Approximation Algorithms for the Unsplittable Flow Problem on Paths and Trees}, booktitle = {{IARCS} Annual Conference on Foundations of Software Technology and Theoretical Computer Science, {FSTTCS} 2012, December 15-17, 2012, Hyderabad, India}, series = {LIPIcs}, volume = {18}, pages = {267--275}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2012}, url = {https://doi.org/10.4230/LIPIcs.FSTTCS.2012.267}, doi = {10.4230/LIPICS.FSTTCS.2012.267}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/ElbassioniGGKN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1210-3719, author = {Divya Gupta and Amit Sahai}, title = {On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption}, journal = {CoRR}, volume = {abs/1210.3719}, year = {2012}, url = {http://arxiv.org/abs/1210.3719}, eprinttype = {arXiv}, eprint = {1210.3719}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1210-3719.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuptaS12, author = {Divya Gupta and Amit Sahai}, title = {On Constant-Round Concurrent Zero-Knowledge from a Knowledge Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {572}, year = {2012}, url = {http://eprint.iacr.org/2012/572}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuptaS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.