default search action
Nishat Koti
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Pranav Jangir, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal:
Vogue: Faster Computation of Private Heavy Hitters. IEEE Trans. Dependable Secur. Comput. 21(4): 3096-3108 (2024) - [c11]Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
Graphiti: Secure Graph Computation Made More Scalable. CCS 2024: 4017-4031 - [c10]Banashri Karmakar, Nishat Koti, Arpita Patra, Sikhar Patranabis, Protik Paul, Divya Ravi:
Asterisk: Super-fast MPC with a Friend. SP 2024: 542-560 - [i18]Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
Graphiti: Secure Graph Computation Made More Scalable. IACR Cryptol. ePrint Arch. 2024: 1756 (2024) - 2023
- [j4]Nishat Koti, Shravani Mahesh Patil, Arpita Patra, Ajith Suresh:
MPClan: Protocol Suite for Privacy-Conscious Computations. J. Cryptol. 36(3): 22 (2023) - [j3]Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
Find Thy Neighbourhood: Privacy-Preserving Local Clustering. Proc. Priv. Enhancing Technol. 2023(2): 23-39 (2023) - [j2]Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal:
Ruffle: Rapid 3-Party Shuffle Protocols. Proc. Priv. Enhancing Technol. 2023(3): 24-42 (2023) - [c9]Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
Shield: Secure Allegation Escrow System with Stronger Guarantees. WWW 2023: 2252-2262 - [i17]Yongqin Wang, Pratik Sarkar, Nishat Koti, Arpita Patra, Murali Annavaram:
CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks. CoRR abs/2311.04406 (2023) - [i16]Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
Shield: Secure Allegation Escrow System with Stronger Guarantees. IACR Cryptol. ePrint Arch. 2023: 338 (2023) - [i15]Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal:
Ruffle: Rapid 3-party shuffle protocols. IACR Cryptol. ePrint Arch. 2023: 431 (2023) - [i14]Banashri Karmakar, Nishat Koti, Arpita Patra, Sikhar Patranabis, Protik Paul, Divya Ravi:
sfAsterisk: Super-fast MPC with a Friend. IACR Cryptol. ePrint Arch. 2023: 1098 (2023) - [i13]Yongqin Wang, Pratik Sarkar, Nishat Koti, Arpita Patra, Murali Annavaram:
CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks. IACR Cryptol. ePrint Arch. 2023: 1729 (2023) - [i12]Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
Entrada to Secure Graph Convolutional Networks. IACR Cryptol. ePrint Arch. 2023: 1807 (2023) - 2022
- [c8]Aditya Hegde, Nishat Koti, Varsha Bhat Kukkala, Shravani Patil, Arpita Patra, Protik Paul:
Attaining GOD Beyond Honest Majority with Friends and Foes. ASIACRYPT (1) 2022: 556-587 - [c7]Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
PentaGOD: Stepping beyond Traditional GOD with Five Parties. CCS 2022: 1843-1856 - [c6]Pranav Jangir, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal:
Poster: Vogue: Faster Computation of Private Heavy Hitters. CCS 2022: 3371-3373 - [c5]Nishat Koti, Shravani Patil, Arpita Patra, Ajith Suresh:
Poster MPClan: : Protocol Suite for Privacy-Conscious Computations. CCS 2022: 3379-3381 - [c4]Nishat Koti, Arpita Patra, Rahul Rachuri, Ajith Suresh:
Tetrad: Actively Secure 4PC for Secure Training and Inference. NDSS 2022 - [i11]Nishat Koti, Shravani Patil, Arpita Patra, Ajith Suresh:
MPClan: Protocol Suite for Privacy-Conscious Computations. CoRR abs/2206.12224 (2022) - [i10]Nishat Koti, Shravani Patil, Arpita Patra, Ajith Suresh:
MPClan: Protocol Suite for Privacy-Conscious Computations. IACR Cryptol. ePrint Arch. 2022: 675 (2022) - [i9]Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
PentaGOD: Stepping beyond Traditional GOD with Five Parties. IACR Cryptol. ePrint Arch. 2022: 1118 (2022) - [i8]Aditya Hegde, Nishat Koti, Varsha Bhat Kukkala, Shravani Patil, Arpita Patra, Protik Paul:
Attaining GOD Beyond Honest Majority With Friends and Foes. IACR Cryptol. ePrint Arch. 2022: 1207 (2022) - [i7]Pranav Jangir, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal, Somya Sangal:
Vogue: Faster Computation of Private Heavy Hitters. IACR Cryptol. ePrint Arch. 2022: 1561 (2022) - [i6]Pranav Shriram A, Nishat Koti, Varsha Bhat Kukkala, Arpita Patra, Bhavish Raj Gopal:
Find Thy Neighbourhood: Privacy-Preserving Local Clustering. IACR Cryptol. ePrint Arch. 2022: 1727 (2022) - 2021
- [c3]Nishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh:
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning. USENIX Security Symposium 2021: 2651-2668 - [i5]Nishat Koti, Arpita Patra, Rahul Rachuri, Ajith Suresh:
Tetrad: Actively Secure 4PC for Secure Training and Inference. CoRR abs/2106.02850 (2021) - [i4]Nishat Koti, Arpita Patra, Rahul Rachuri, Ajith Suresh:
Tetrad: Actively Secure 4PC for Secure Training and Inference. IACR Cryptol. ePrint Arch. 2021: 755 (2021) - 2020
- [i3]Nishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh:
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning. CoRR abs/2005.10296 (2020) - [i2]Nishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh:
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning. IACR Cryptol. ePrint Arch. 2020: 592 (2020)
2010 – 2019
- 2016
- [j1]Nishat Koti, B. R. Purushothama:
Group-oriented encryption for dynamic groups with constant rekeying cost. Secur. Commun. Networks 9(17): 4120-4137 (2016) - 2015
- [c2]B. R. Purushothama, Nishat Koti:
Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model. ICACCI 2015: 1825-1829 - [c1]Nishat Koti, Esha Keni, Kritika, B. R. Purushothama:
Non-tree Based Group Key Management Scheme With Constant Rekeying and Storage Cost. WCI 2015: 564-572 - [i1]B. R. Purushothama, Nishat Koti:
On the Security of an Efficient Group Key Agreement Scheme for MANETs. IACR Cryptol. ePrint Arch. 2015: 177 (2015)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint