Loading...
The system can't perform the operation now. Try again later.
Citations per year
Duplicate citations
The following articles are merged in Scholar. Their
combined citations
are counted only for the first article.
Merged citations
This "Cited by" count includes citations to the following articles in Scholar. The ones marked
*
may be different from the article in the profile.
Add co-authors
Co-authors
Follow
New articles by this author
New citations to this author
New articles related to this author's research
Email address for updates
Done
My profile
My library
Metrics
Alerts
Settings
Sign in
Sign in
Get my own profile
Cited by
All
Since 2019
Citations
235
229
h-index
6
6
i10-index
4
4
0
120
60
30
90
2017
2018
2019
2020
2021
2022
2023
2024
3
3
7
5
27
51
112
26
Public access
View all
View all
5 articles
0 articles
available
not available
Based on funding mandates
Follow
Nishat Koti
Technical University of Darmstadt
, Germany
Verified email at encrypto.cs.tu-darmstadt.de -
Homepage
Cryptography
Secure Multiparty Computation
Articles
Cited by
Public access
Title
Sort
Sort by citations
Sort by year
Sort by title
Cited by
Cited by
Year
{SWIFT}: Super-fast and robust {Privacy-Preserving} machine learning
N Koti, M Pancholi, A Patra, A Suresh
30th USENIX Security Symposium (USENIX Security 21), 2651-2668
, 2021
110
2021
Tetrad: Actively secure 4pc for secure training and inference
N Koti, A Patra, R Rachuri, A Suresh
arXiv preprint arXiv:2106.02850
, 2021
57
2021
Group‐oriented encryption for dynamic groups with constant rekeying cost
K Nishat, BR Purushothama
Security and communication networks 9 (17), 4120-4137
, 2016
16
2016
MPClan: Protocol suite for privacy-conscious computations
N Koti, S Patil, A Patra, A Suresh
Journal of Cryptology 36 (3), 22
, 2023
13
2023
Ruffle: Rapid 3-party shuffle protocols
N Koti, VB Kukkala, A Patra, BR Gopal, S Sangal
Proceedings on Privacy Enhancing Technologies
, 2023
7
*
2023
Pentagod: Stepping beyond traditional god with five parties
N Koti, VB Kukkala, A Patra, B Raj Gopal
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …
, 2022
6
2022
Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model
BR Purushothama, N Koti
2015 International Conference on Advances in Computing, Communications and …
, 2015
6
2015
Poster: Vogue: Faster computation of private heavy hitters
P Jangir, N Koti, VB Kukkala, A Patra, B Raj Gopal, S Sangal
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …
, 2022
5
2022
Vogue: Faster computation of private heavy hitters
P Jangir, N Koti, VB Kukkala, A Patra, BR Gopal, S Sangal
IEEE Transactions on Dependable and Secure Computing
, 2023
3
2023
: Super-fast MPC with a Friend
B Karmakar, N Koti, A Patra, S Patranabis, P Paul, D Ravi
Cryptology ePrint Archive
, 2023
3
2023
Find thy neighbourhood: Privacy-preserving local clustering
N Koti, VB Kukkala, A Patra, BR Gopal
Proceedings on Privacy Enhancing Technologies
, 2023
2
2023
Attaining god beyond honest majority with friends and foes
A Hegde, N Koti, VB Kukkala, S Patil, A Patra, P Paul
International Conference on the Theory and Application of Cryptology and …
, 2022
2
2022
Non-tree based group key management scheme with constant rekeying and storage cost
N Koti, E Keni, Kritika, BR Purushothama
Proceedings of the Third International Symposium on Women in Computing and …
, 2015
2
2015
CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks
Y Wang, P Sarkar, N Koti, A Patra, M Annavaram
arXiv preprint arXiv:2311.04406
, 2023
1
2023
Poster MPClan: Protocol Suite for Privacy-Conscious Computations
N Koti, S Patil, A Patra, A Suresh
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …
, 2022
1
2022
Dynamic Access Control in a Hierarchy with Constant Key Derivation Cost
N Koti, BR Purushothama
Progress in Intelligent Computing Techniques: Theory, Practice, and …
, 2018
1
2018
Shield: Secure Allegation Escrow System with Stronger Guarantees
N Koti, VB Kukkala, A Patra, B Raj Gopal
Proceedings of the ACM Web Conference 2023, 2252-2262
, 2023
2023
Entrada to Secure Graph Convolutional Networks
N Koti, VB Kukkala, A Patra, BR Gopal
Cryptology ePrint Archive
, 2023
2023
On the Security of an Efficient Group Key Agreement Scheme for MANETs
BR Purushothama, N Koti
Cryptology ePrint Archive
, 2015
2015
Poster: You Share Because We Care: Secure Allegation Escrow System
N Koti, VB Kukkala, A Patra
The system can't perform the operation now. Try again later.
Articles 1–20
Show more
Privacy
Terms
Help
About Scholar
Search help