{SWIFT}: Super-fast and robust {Privacy-Preserving} machine learning N Koti, M Pancholi, A Patra, A Suresh
30th USENIX Security Symposium (USENIX Security 21), 2651-2668, 2021
108 2021 Tetrad: Actively secure 4pc for secure training and inference N Koti, A Patra, R Rachuri, A Suresh
arXiv preprint arXiv:2106.02850, 2021
56 2021 Group‐oriented encryption for dynamic groups with constant rekeying cost K Nishat, BR Purushothama
Security and communication networks 9 (17), 4120-4137, 2016
16 2016 MPClan: Protocol suite for privacy-conscious computations N Koti, S Patil, A Patra, A Suresh
Journal of Cryptology 36 (3), 22, 2023
12 2023 Ruffle: Rapid 3-party shuffle protocols AP Shriram, N Koti, VB Kukkala, A Patra, BR Gopal, S Sangal
Proceedings on Privacy Enhancing Technologies (PoPETs) 3, 2023
6 * 2023 Pentagod: Stepping beyond traditional god with five parties N Koti, VB Kukkala, A Patra, B Raj Gopal
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
6 2022 Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model BR Purushothama, N Koti
2015 International Conference on Advances in Computing, Communications and …, 2015
6 2015 Poster: Vogue: Faster computation of private heavy hitters P Jangir, N Koti, VB Kukkala, A Patra, B Raj Gopal, S Sangal
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
4 2022 Vogue: Faster computation of private heavy hitters P Jangir, N Koti, VB Kukkala, A Patra, BR Gopal, S Sangal
IEEE Transactions on Dependable and Secure Computing, 2023
3 2023 : Super-fast MPC with a FriendB Karmakar, N Koti, A Patra, S Patranabis, P Paul, D Ravi
Cryptology ePrint Archive, 2023
3 2023 Find thy neighbourhood: Privacy-preserving local clustering N Koti, VB Kukkala, A Patra, BR Gopal
Proceedings on Privacy Enhancing Technologies, 2023
2 2023 Attaining god beyond honest majority with friends and foes A Hegde, N Koti, VB Kukkala, S Patil, A Patra, P Paul
International Conference on the Theory and Application of Cryptology and …, 2022
2 2022 Non-tree based group key management scheme with constant rekeying and storage cost N Koti, E Keni, Kritika, BR Purushothama
Proceedings of the Third International Symposium on Women in Computing and …, 2015
2 2015 CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks Y Wang, P Sarkar, N Koti, A Patra, M Annavaram
arXiv preprint arXiv:2311.04406, 2023
1 2023 Poster MPClan: Protocol Suite for Privacy-Conscious Computations N Koti, S Patil, A Patra, A Suresh
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
1 2022 Dynamic Access Control in a Hierarchy with Constant Key Derivation Cost N Koti, BR Purushothama
Progress in Intelligent Computing Techniques: Theory, Practice, and …, 2018
1 2018 Shield: Secure Allegation Escrow System with Stronger Guarantees N Koti, VB Kukkala, A Patra, B Raj Gopal
Proceedings of the ACM Web Conference 2023, 2252-2262, 2023
2023 Entrada to Secure Graph Convolutional Networks N Koti, VB Kukkala, A Patra, BR Gopal
Cryptology ePrint Archive, 2023
2023 On the Security of an Efficient Group Key Agreement Scheme for MANETs BR Purushothama, N Koti
Cryptology ePrint Archive, 2015
2015 Poster: You Share Because We Care: Secure Allegation Escrow System N Koti, VB Kukkala, A Patra