Nishanth Chandran
Nishanth Chandran
Principal Researcher, Microsoft Research, India
Verified email at microsoft.com - Homepage
Title
Cited by
Cited by
Year
Position based cryptography
N Chandran, V Goyal, R Moriarty, R Ostrovsky
Annual International Cryptology Conference, 391-407, 2009
1752009
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
J Camenisch, N Chandran, V Shoup
Annual International Conference on the Theory and Applications of …, 2009
1602009
Position-based quantum cryptography: Impossibility and constructions
H Buhrman, N Chandran, S Fehr, R Gelles, V Goyal, R Ostrovsky, ...
SIAM Journal on Computing 43 (1), 150-178, 2014
1522014
Ring signatures of sub-linear size without random oracles
N Chandran, J Groth, A Sahai
International Colloquium on Automata, Languages, and Programming, 423-434, 2007
1142007
New constructions for UC secure computation using tamper-proof hardware
N Chandran, V Goyal, A Sahai
Annual International Conference on the Theory and Applications of …, 2008
1072008
Securenn: 3-party secure computation for neural network training
S Wagh, D Gupta, N Chandran
Proceedings on Privacy Enhancing Technologies 2019 (3), 26-49, 2019
74*2019
Big data analytics over encrypted datasets with seabed
A Papadimitriou, R Bhagwan, N Chandran, R Ramjee, A Haeberlen, ...
12th {USENIX} Symposium on Operating Systems Design and Implementation …, 2016
712016
User-controlled data encryption with obfuscated policy
N Chandran, ME Chase, KE Lauter, V Vaikuntanathan
US Patent 9,077,525, 2015
492015
Functional re-encryption and collusion-resistant obfuscation
N Chandran, M Chase, V Vaikuntanathan
Theory of Cryptography Conference, 404-421, 2012
472012
Block-wise non-malleable codes
N Chandran, V Goyal, P Mukherjee, O Pandey, J Upadhyay
43rd International Colloquium on Automata, Languages, and Programming (ICALP …, 2016
462016
A secure cryptographic token interface
C Cachin, N Chandran
2009 22nd IEEE Computer Security Foundations Symposium, 141-153, 2009
432009
Privacy amplification with asymptotically optimal entropy loss
N Chandran, B Kanukurthi, R Ostrovsky, L Reyzin
Proceedings of the forty-second ACM symposium on Theory of computing, 785-794, 2010
422010
HOP: Hardware makes Obfuscation Practical.
K Nayak, CW Fletcher, L Ren, N Chandran, SV Lokam, E Shi, V Goyal
NDSS, 2017
402017
Locally updatable and locally decodable codes
N Chandran, B Kanukurthi, R Ostrovsky
Theory of Cryptography Conference, 489-514, 2014
372014
A clustering approach to solve the multiple travelling salesmen problem
N Chandran, TT Narendran, K Ganesh
International Journal of Industrial and Systems Engineering 1 (3), 372-387, 2006
372006
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices
N Chandran, M Chase, FH Liu, R Nishimaki, K Xagawa
International Workshop on Public Key Cryptography, 95-112, 2014
342014
Achieving privacy in verifiable computation with multiple servers–without fhe and without pre-processing
P Ananth, N Chandran, V Goyal, B Kanukurthi, R Ostrovsky
International Workshop on Public Key Cryptography, 149-166, 2014
292014
EzPC: programmable, efficient, and scalable secure two-party computation for machine learning
N Chandran, D Gupta, A Rastogi, R Sharma, S Tripathi
ePrint Report 1109, 2017
282017
Information-theoretic local non-malleable codes and their applications
N Chandran, B Kanukurthi, S Raghuraman
Theory of Cryptography Conference, 367-392, 2016
262016
Covert multi-party computation
N Chandran, V Goyal, R Ostrovsky, A Sahai
48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07), 238-248, 2007
232007
The system can't perform the operation now. Try again later.
Articles 1–20