Personal information

Activities

Works (17)

Graphiti: Secure Graph Computation Made More Scalable

2024-12-02 | Conference paper
Contributors: Nishat Koti; Varsha Bhat Kukkala; Arpita Patra; Bhavish Raj Gopal
Source: check_circle
Crossref

Vogue: Faster Computation of Private Heavy Hitters

IEEE Transactions on Dependable and Secure Computing
2024-07 | Journal article
Contributors: Pranav Jangir; Nishat Koti; Varsha Bhat Kukkala; Arpita Patra; Bhavish Raj Gopal; Somya Sangal
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks

arXiv
2023 | Other
EID:

2-s2.0-85178401404

Part of ISSN: 23318422
Contributors: Wang, Y.; Sarkar, P.; Koti, N.; Patra, A.; Annavaram, M.
Source: Self-asserted source
Nishat Koti via Scopus - Elsevier

MPClan: Protocol Suite for Privacy-Conscious Computations

Journal of Cryptology
2023-07 | Journal article
Contributors: Nishat Koti; Shravani Patil; Arpita Patra; Ajith Suresh
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Shield: Secure Allegation Escrow System with Stronger Guarantees

2023-04-30 | Conference paper
Contributors: Nishat Koti; Varsha Bhat Kukkala; Arpita Patra; Bhavish Raj Gopal
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Attaining GOD Beyond Honest Majority with Friends and Foes

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2022 | Conference paper
EID:

2-s2.0-85149696766

Part of ISBN: 9783031229626
Part of ISSN: 16113349 03029743
Contributors: Hegde, A.; Koti, N.; Kukkala, V.B.; Patil, S.; Patra, A.; Paul, P.
Source: Self-asserted source
Nishat Koti via Scopus - Elsevier

MPClan: Protocol Suite for Privacy-Conscious Computations

arXiv
2022 | Other
EID:

2-s2.0-85133817382

Part of ISSN: 23318422
Contributors: Koti, N.; Patil, S.; Patra, A.; Suresh, A.
Source: Self-asserted source
Nishat Koti via Scopus - Elsevier

PentaGOD: Stepping beyond Traditional GOD with Five Parties

Proceedings of the ACM Conference on Computer and Communications Security
2022 | Conference paper
EID:

2-s2.0-85143085489

Part of ISBN: 9781450394505
Part of ISSN: 15437221
Contributors: Koti, N.; Kukkala, V.B.; Patra, A.; Raj Gopal, B.
Source: Self-asserted source
Nishat Koti via Scopus - Elsevier

Poster MPClan:: Protocol Suite for Privacy-Conscious Computations

Proceedings of the ACM Conference on Computer and Communications Security
2022 | Conference paper
EID:

2-s2.0-85143074586

Part of ISBN: 9781450394505
Part of ISSN: 15437221
Contributors: Koti, N.; Patil, S.; Patra, A.; Suresh, A.
Source: Self-asserted source
Nishat Koti via Scopus - Elsevier

Poster: Vogue: Faster Computation of Private Heavy Hitters

Proceedings of the ACM Conference on Computer and Communications Security
2022 | Conference paper
EID:

2-s2.0-85143084770

Part of ISBN: 9781450394505
Part of ISSN: 15437221
Contributors: Jangir, P.; Koti, N.; Kukkala, V.B.; Patra, A.; Raj Gopal, B.; Sangal, S.
Source: Self-asserted source
Nishat Koti via Scopus - Elsevier

Tetrad: Actively Secure 4PC for Secure Training and Inference

29th Annual Network and Distributed System Security Symposium, NDSS 2022
2022 | Conference paper
EID:

2-s2.0-85176102902

Contributors: Koti, N.; Patra, A.; Rachuri, R.; Suresh, A.
Source: Self-asserted source
Nishat Koti via Scopus - Elsevier

SWIFT: Super-fast and robust privacy-preserving machine learning

Proceedings of the 30th USENIX Security Symposium
2021 | Conference paper
EID:

2-s2.0-85108587512

Part of ISBN: 9781939133243
Contributors: Koti, N.; Pancholi, M.; Patra, A.; Suresh, A.
Source: Self-asserted source
Nishat Koti via Scopus - Elsevier

Tetrad: Actively Secure 4PC for Secure Training and Inference (Full Version)

arXiv
2021 | Other
EID:

2-s2.0-85171058114

Part of ISSN: 23318422
Contributors: Koti, N.; Patra, A.; Rachuri, R.; Suresh, A.
Source: Self-asserted source
Nishat Koti via Scopus - Elsevier

SWIFT: Super-fast and robust privacy-preserving machine learning

arXiv
2020 | Other
EID:

2-s2.0-85169482452

Part of ISSN: 23318422
Contributors: Koti, N.; Pancholi, M.; Patra, A.; Suresh, A.
Source: Self-asserted source
Nishat Koti via Scopus - Elsevier

Dynamic access control in a hierarchy with constant key derivation cost

Advances in Intelligent Systems and Computing
2018 | Conference paper
EID:

2-s2.0-85032637226

Part of ISBN: 9789811033759
Part of ISSN: 21945357
Contributors: Koti, N.; Purushothama, B.R.
Source: Self-asserted source
Nishat Koti via Scopus - Elsevier

Non-tree based group key management scheme with constant rekeying and storage cost

ACM International Conference Proceeding Series
2015 | Conference paper
EID:

2-s2.0-84960947783

Part of ISBN: 9781450333610
Contributors: Kritika; Purushothama, B.R.; Koti, N.; Keni, E.
Source: Self-asserted source
Nishat Koti via Scopus - Elsevier

Security analysis of tree and non-tree based group key management schemes under strong active outsider attack model

2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015
2015 | Conference paper
EID:

2-s2.0-84946196762

Part of ISBN: 9781479987917
Contributors: Purushothama, B.R.; Koti, N.
Source: Self-asserted source
Nishat Koti via Scopus - Elsevier