What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Arpita Patra
Google Scholar
61
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
Match Quest: Fast and Secure Pattern Matching.
Pranav Jangir
Nishat Koti
Varsha Bhat Kukkala
Arpita Patra
Bhavish Raj Gopal
2025
conf/asiaccs
Pay What You Spend! Privacy-Aware Real-Time Pricing with High Precision IEEE 754 Floating Point Division.
Soumyadyuti Ghosh
Harishma Boyapally
Ajith Suresh
Arpita Patra
Soumyajit Dey
Debdeep Mukhopadhyay
2025
journals/joc
Asymptotically Free Broadcast in Constant Expected Time via Packed VSS.
Ittai Abraham
Gilad Asharov
Shravani Patil
Arpita Patra
2024
journals/popets
Privadome: Delivery Drones and Citizen Privacy.
Gokulnath Pillai
Ajith Suresh
Eikansh Gupta
Vinod Ganapathy
Arpita Patra
2024
conf/ccs
Graphiti: Secure Graph Computation Made More Scalable.
Nishat Koti
Varsha Bhat Kukkala
Arpita Patra
Bhavish Raj Gopal
2024
conf/sp
Asterisk: Super-fast MPC with a Friend.
Banashri Karmakar
Nishat Koti
Arpita Patra
Sikhar Patranabis
Protik Paul
Divya Ravi
2024
conf/eurocrypt
Perfect Asynchronous MPC with Linear Communication Overhead.
Ittai Abraham
Gilad Asharov
Shravani Patil
Arpita Patra
2024
conf/tcc
Asynchronous Agreement on a Core Set in Constant Expected Time and More Efficient Asynchronous VSS and MPC.
Ittai Abraham
Gilad Asharov
Arpita Patra
Gilad Stern
2023
journals/popets
Find Thy Neighbourhood: Privacy-Preserving Local Clustering.
Pranav Shriram A
Nishat Koti
Varsha Bhat Kukkala
Arpita Patra
Bhavish Raj Gopal
2023
journals/popets
Ruffle: Rapid 3-Party Shuffle Protocols.
Pranav Shriram A
Nishat Koti
Varsha Bhat Kukkala
Arpita Patra
Bhavish Raj Gopal
Somya Sangal
2023
journals/joc
MPClan: Protocol Suite for Privacy-Conscious Computations.
Nishat Koti
Shravani Mahesh Patil
Arpita Patra
Ajith Suresh
2023
journals/joc
On the Communication Efficiency of Statistically Secure Asynchronous MPC with Optimal Resilience.
Ashish Choudhury
Arpita Patra
2023
conf/eurocrypt
Detect, Pack and Batch: Perfectly-Secure MPC with Linear Communication and Constant Expected Time.
Ittai Abraham
Gilad Asharov
Shravani Patil
Arpita Patra
2022
journals/popets
How to prove any NP statement jointly? Efficient Distributed-prover Zero-Knowledge Protocols.
Pankaj Dayama
Arpita Patra
Protik Paul
Nitin Singh
Dhinakaran Vinayagamurthy
2022
conf/ccs
PentaGOD: Stepping beyond Traditional GOD with Five Parties.
Nishat Koti
Varsha Bhat Kukkala
Arpita Patra
Bhavish Raj Gopal
2022
conf/ccs
Poster MPClan: : Protocol Suite for Privacy-Conscious Computations.
Nishat Koti
Shravani Patil
Arpita Patra
Ajith Suresh
2022
conf/ccs
Poster: Vogue: Faster Computation of Private Heavy Hitters.
Pranav Jangir
Nishat Koti
Varsha Bhat Kukkala
Arpita Patra
Bhavish Raj Gopal
Somya Sangal
2022
conf/crypto
Quadratic Multiparty Randomized Encodings Beyond Honest Majority and Their Applications.
Benny Applebaum
Yuval Ishai
Or Karni
Arpita Patra
2022
conf/crypto
Verifiable Relation Sharing and Multi-verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority - (Extended Abstract).
Benny Applebaum
Eliran Kachlon
Arpita Patra
2022
conf/ndss
Tetrad: Actively Secure 4PC for Secure Training and Inference.
Nishat Koti
Arpita Patra
Rahul Rachuri
Ajith Suresh
2022
conf/asiacrypt
Attaining GOD Beyond Honest Majority with Friends and Foes.
Aditya Hegde
Nishat Koti
Varsha Bhat Kukkala
Shravani Patil
Arpita Patra
Protik Paul
2022
conf/tcc
On Perfectly Secure Two-Party Computation for Symmetric Functionalities with Correlated Randomness.
Bar Alon
Olga Nissenbaum
Eran Omri
Anat Paskin-Cherniavsky
Arpita Patra
2022
conf/tcc
Fully-Secure MPC with Minimal Trust.
Yuval Ishai
Arpita Patra
Sikhar Patranabis
Divya Ravi
Akshayaram Srinivasan
2022
conf/tcc
Round-Optimal Honest-Majority MPC in Minicrypt and with Everlasting Security - (Extended Abstract).
Benny Applebaum
Eliran Kachlon
Arpita Patra
2022
conf/tcc
Asymptotically Free Broadcast in Constant Expected Time via Packed VSS.
Ittai Abraham
Gilad Asharov
Shravani Patil
Arpita Patra
2021
journals/joc
On the Exact Round Complexity of Secure Three-Party Computation.
Arpita Patra
Divya Ravi
2021
conf/uss
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning.
Nishat Koti
Mahak Pancholi
Arpita Patra
Ajith Suresh
2021
conf/uss
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation.
Arpita Patra
Thomas Schneider
Ajith Suresh
Hossein Yalame
2021
conf/crypto
Three-Round Secure Multiparty Computation from Black-Box Two-Round Oblivious Transfer.
Arpita Patra
Akshayaram Srinivasan
2021
conf/host
SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation.
Arpita Patra
Thomas Schneider
Ajith Suresh
Hossein Yalame
2020
journals/popets
FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning.
Megha Byali
Harsh Chaudhari
Arpita Patra
Ajith Suresh
2020
conf/ndss
BLAZE: Blazing Fast Privacy-Preserving Machine Learning.
Arpita Patra
Ajith Suresh
2020
conf/asiacrypt
On the Exact Round Complexity of Best-of-Both-Worlds Multi-party Computation.
Arpita Patra
Divya Ravi
Swati Singla
2020
conf/tcc
The Resiliency of MPC with Low Interaction: The Benefit of Making Errors (Extended Abstract).
Benny Applebaum
Eliran Kachlon
Arpita Patra
2019
conf/ccs
Fast Actively Secure Five-Party Computation with Security Beyond Abort.
Megha Byali
Carmit Hazay
Arpita Patra
Swati Singla
2019
conf/ccs
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction.
Harsh Chaudhari
Ashish Choudhury
Arpita Patra
Ajith Suresh
2019
conf/asiacrypt
Beyond Honest Majority: The Round Complexity of Fair and Robust Multi-party Computation.
Arpita Patra
Divya Ravi
2018
conf/ccs
Fast Secure Computation for Small Population over the Internet.
Megha Byali
Arun Joseph
Arpita Patra
Divya Ravi
2018
conf/crypto
On the Exact Round Complexity of Secure Three-Party Computation.
Arpita Patra
Divya Ravi
2018
conf/pkc
Efficient Adaptively Secure Zero-Knowledge from Garbled Circuits.
Chaya Ganesh
Yashvanth Kondi
Arpita Patra
Pratik Sarkar
2017
journals/joc
Efficient One-Sided Adaptively Secure Computation.
Carmit Hazay
Arpita Patra
2017
conf/crypto
Privacy-Free Garbled Circuits for Formulas: Size Zero and Information-Theoretic.
Yashvanth Kondi
Arpita Patra
2017
conf/ndss
Fast Actively Secure OT Extension for Short Secrets.
Arpita Patra
Pratik Sarkar
Ajith Suresh
2015
journals/joc
Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation.
Arpita Patra
Ashish Choudhury
C. Pandu Rangan
2015
conf/asiacrypt
Selective Opening Security for Receivers.
Carmit Hazay
Arpita Patra
Bogdan Warinschi
2014
conf/latincrypt
Anonymous Authentication with Shared Secrets.
Joël Alwen
Martin Hirt
Ueli Maurer
Arpita Patra
Pavel Raykov
2014
conf/tcc
One-Sided Adaptively Secure Two-Party Computation.
Carmit Hazay
Arpita Patra
2013
conf/asiacrypt
Between a Rock and a Hard Place: Interpolating between MPC and FHE.
Ashish Choudhury
Jake Loftus
Emmanuela Orsini
Arpita Patra
Nigel P. Smart
2011
conf/acns
Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary.
Ashish Choudhury
Kaoru Kurosawa
Arpita Patra
2011
conf/icisc
On the Communication Complexity of Reliable and Secure Message Transmission in Asynchronous Networks.
Ashish Choudhury
Arpita Patra
2011
conf/asiacrypt
Computational Verifiable Secret Sharing Revisited.
Michael Backes
Aniket Kate
Arpita Patra
2010
conf/latincrypt
Communication Optimal Multi-valued Asynchronous Broadcast Protocol.
Arpita Patra
C. Pandu Rangan
2010
conf/asiacrypt
The Round Complexity of Verifiable Secret Sharing: The Statistical Case.
Ranjit Kumaresan
Arpita Patra
C. Pandu Rangan
2010
conf/africacrypt
Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience.
Arpita Patra
Ashish Choudhary
C. Pandu Rangan
2009
conf/ccs
Unconditionally secure message transmission in arbitrary directed synchronous networks tolerating generalized mixed adversary.
Kannan Srinathan
Arpita Patra
Ashish Choudhary
C. Pandu Rangan
2009
conf/crypto
The Round Complexity of Verifiable Secret Sharing Revisited.
Arpita Patra
Ashish Choudhary
Tal Rabin
C. Pandu Rangan
2009
conf/sacrypt
Information Theoretically Secure Multi Party Set Intersection Re-visited.
Arpita Patra
Ashish Choudhary
C. Pandu Rangan
2009
conf/cans
Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security.
G. Sathya Narayanan
T. Aishwarya
Anugrah Agrawal
Arpita Patra
Ashish Choudhary
C. Pandu Rangan
2008
conf/acisp
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary.
Arpita Patra
Ashish Choudhary
Madhu Vaidyanathan
C. Pandu Rangan
2008
conf/cans
Unconditionally Reliable Message Transmission in Directed Hypergraphs.
Kannan Srinathan
Arpita Patra
Ashish Choudhary
C. Pandu Rangan
2007
conf/cans
Perfectly Secure Message Transmission in Directed Networks Tolerating Threshold and Non Threshold Adversary.
Arpita Patra
Bhavani Shankar
Ashish Choudhary
K. Srinathan
C. Pandu Rangan
Coauthors
Aditya Hegde
(1)
Ajith Suresh
(12)
Akshayaram Srinivasan
(2)
Anat Paskin-Cherniavsky
(1)
Aniket Kate
(1)
Anugrah Agrawal
(1)
Arpita Patra
(61)
Arun Joseph
(1)
Ashish Choudhary
(8)
Ashish Choudhury
(6)
Banashri Karmakar
(1)
Bar Alon
(1)
Benny Applebaum
(4)
Bhavani Shankar
(1)
Bhavish Raj Gopal
(6)
Bogdan Warinschi
(1)
C. Pandu Rangan
(11)
Carmit Hazay
(4)
Chaya Ganesh
(1)
Debdeep Mukhopadhyay
(1)
Dhinakaran Vinayagamurthy
(1)
Divya Ravi
(7)
Eikansh Gupta
(1)
Eliran Kachlon
(3)
Emmanuela Orsini
(1)
Eran Omri
(1)
G. Sathya Narayanan
(1)
Gilad Asharov
(5)
Gilad Stern
(1)
Gokulnath Pillai
(1)
Harishma Boyapally
(1)
Harsh Chaudhari
(2)
Hossein Yalame
(2)
Ittai Abraham
(5)
Jake Loftus
(1)
Joël Alwen
(1)
K. Srinathan
(1)
Kannan Srinathan
(2)
Kaoru Kurosawa
(1)
Madhu Vaidyanathan
(1)
Mahak Pancholi
(1)
Martin Hirt
(1)
Megha Byali
(3)
Michael Backes
(1)
Nigel P. Smart
(1)
Nishat Koti
(12)
Nitin Singh
(1)
Olga Nissenbaum
(1)
Or Karni
(1)
Pankaj Dayama
(1)
Pavel Raykov
(1)
Pranav Jangir
(2)
Pranav Shriram A
(2)
Pratik Sarkar
(2)
Protik Paul
(3)
Rahul Rachuri
(1)
Ranjit Kumaresan
(1)
Shravani Mahesh Patil
(1)
Shravani Patil
(6)
Sikhar Patranabis
(2)
Somya Sangal
(2)
Soumyadyuti Ghosh
(1)
Soumyajit Dey
(1)
Swati Singla
(2)
T. Aishwarya
(1)
Tal Rabin
(1)
Thomas Schneider
(2)
Ueli Maurer
(1)
Varsha Bhat Kukkala
(7)
Vinod Ganapathy
(1)
Yashvanth Kondi
(2)
Yuval Ishai
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to