Name
Affiliation
Papers
NISHANTH CHANDRAN
Department of Computer Science, UCLA
39
Collaborators
Citations 
PageRank 
73
375
21.86
Referers 
Referees 
References 
742
695
558
Search Limit
100742
Title
Citations
PageRank
Year
Circuit-PSI With Linear Complexity via Relaxed Batch OPPRF.10.342022
SiRnn: A Math Library for Secure RNN Inference10.352021
Efficient Linear Multiparty PSI and Extensions to Circuit/Quorum PSI00.342021
Adaptive Extractors And Their Application To Leakage Resilient Secret Sharing00.342021
Blockene: A High-Throughput Blockchain Over Mobile Devices00.342020
Universally Composable Secure Computation with Corrupted Tokens.00.342019
SecureNN: 3-Party Secure Computation for Neural Network Training.100.522019
EzPC: Programmable and Efficient Secure Two-Party Computation for Machine Learning40.402019
CrypTFlow: Secure TensorFlow Inference30.422019
SecureNN: Efficient and Private Neural Network Training.10.362018
HOP: Hardware makes Obfuscation Practical.70.422017
Universally Composable Secure Two and Multi-party Computation in the Corruptible Tamper-Proof Hardware Token Model.00.342017
EzPC: Programmable, Efficient, and Scalable Secure Two-Party Computation.20.362017
Efficient, Constant-Round and Actively Secure MPC: Beyond the Three-Party Case.20.362017
Block-wise Non-Malleable Codes.00.342016
Information-Theoretic Local Non-malleable Codes and Their Applications.90.482016
Big Data Analytics over Encrypted Datasets with Seabed.100.472016
Reducing Multilinear Map Levels in Constrained PRFs and ABE.00.342015
The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults90.482015
Functional Encryption: Decentralised and Delegatable.20.362015
Constrained Pseudorandom Functions: Verifiable and Delegatable.100.472014
Optimally Resilient and Adaptively Secure Multi-Party Computation with Low Communication Locality.30.362014
Locally Updatable and Locally Decodable Codes.160.862014
Almost-Everywhere Secure Computation with Edge Corruptions.40.412012
Edge fault tolerance on sparse networks40.392012
Functional re-encryption and collusion-resistant obfuscation180.762012
Hardness Preserving Constructions of Pseudorandom Functions, Revisited.10.352012
Position-Based Quantum Cryptography40.572011
Collusion Resistant Obfuscation and Functional Re-encryption.10.372011
Position-Based Quantum Cryptography: Impossibility and Constructions80.602010
Privacy amplification with asymptotically optimal entropy loss90.582010
Improved fault tolerance and secure computation on sparse networks90.472010
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks942.662009
A Secure Cryptographic Token Interface181.042009
New constructions for UC secure computation using tamper-proof hardware491.252008
Public-key encryption with efficient amortized updates70.612008
Ring signatures of sub-linear size without random oracles511.402007
Covert Multi-Party Computation50.572007
Improved algorithms for optimal embeddings30.442006