default search action
Ajith Suresh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j6]Christopher Harth-Kitzerow, Ajith Suresh, Yongqin Wang, Hossein Yalame, Georg Carle, Murali Annavaram:
High-Throughput Secure Multiparty Computation with an Honest Majority in Various Network Settings. Proc. Priv. Enhancing Technol. 2025(1): 250-272 (2025) - [j5]Najwa Aaraj, Abdelrahaman Aly, Tim Güneysu, Chiara Marcolla, Johannes Mono, Rogerio Paludo, Iván Santos-González, Mireia Scholz, Eduardo Soria-Vazquez, Victor Sucasas, Ajith Suresh:
FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2025(1): 1-36 (2025) - 2024
- [j4]Gokulnath Pillai, Ajith Suresh, Eikansh Gupta, Vinod Ganapathy, Arpita Patra:
Privadome: Delivery Drones and Citizen Privacy. Proc. Priv. Enhancing Technol. 2024(2): 29-48 (2024) - [c16]Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, Avishay Yanai:
ScionFL: Efficient and Robust Secure Quantized Aggregation. SaTML 2024: 490-511 - [c15]Andreas Brüggemann, Oliver Schick, Thomas Schneider, Ajith Suresh, Hossein Yalame:
Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater. SP 2024: 503-522 - [i30]Thomas Schneider, Ajith Suresh, Hossein Yalame:
Comments on "Privacy-Enhanced Federated Learning Against Poisoning Adversaries". CoRR abs/2409.19964 (2024) - [i29]Thomas Schneider, Ajith Suresh, Hossein Yalame:
Comments on "Privacy-Enhanced Federated Learning Against Poisoning Adversaries". IACR Cryptol. ePrint Arch. 2024: 1504 (2024) - 2023
- [j3]Nishat Koti, Shravani Mahesh Patil, Arpita Patra, Ajith Suresh:
MPClan: Protocol Suite for Privacy-Conscious Computations. J. Cryptol. 36(3): 22 (2023) - [j2]Thomas Schneider, Ajith Suresh, Hossein Yalame:
Comments on "Privacy-Enhanced Federated Learning Against Poisoning Adversaries". IEEE Trans. Inf. Forensics Secur. 18: 1407-1409 (2023) - [c14]Gowri R. Chandran, Raine Nieminen, Thomas Schneider, Ajith Suresh:
PrivMail: A Privacy-Preserving Framework for Secure Emails. ESORICS (2) 2023: 145-165 - [c13]Till Gehlhar, Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Hossein Yalame:
SafeFL: MPC-friendly Framework for Private and Robust Federated Learning. SP (Workshops) 2023: 69-76 - [c12]Andreas Brüggemann, Robin Hundt, Thomas Schneider, Ajith Suresh, Hossein Yalame:
FLUTE: Fast and Secure Lookup Table Evaluations. SP 2023: 515-533 - [i28]Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Christian Weinert, Hossein Yalame:
HyFL: A Hybrid Approach For Private Federated Learning. CoRR abs/2302.09904 (2023) - [i27]Andreas Brüggemann, Robin Hundt, Thomas Schneider, Ajith Suresh, Hossein Yalame:
FLUTE: Fast and Secure Lookup Table Evaluations (Full Version). IACR Cryptol. ePrint Arch. 2023: 499 (2023) - [i26]Till Gehlhar, Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Hossein Yalame:
SAFEFL: MPC-friendly Framework for Private and Robust Federated Learning. IACR Cryptol. ePrint Arch. 2023: 555 (2023) - [i25]Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, Avishay Yanai:
ScionFL: Efficient and Robust Secure Quantized Aggregation. IACR Cryptol. ePrint Arch. 2023: 652 (2023) - [i24]Gowri R. Chandran, Raine Nieminen, Thomas Schneider, Ajith Suresh:
PrivMail: A Privacy-Preserving Framework for Secure Emails. IACR Cryptol. ePrint Arch. 2023: 1294 (2023) - [i23]Andreas Brüggemann, Oliver Schick, Thomas Schneider, Ajith Suresh, Hossein Yalame:
Don't Eject the Impostor: Fast Three-Party Computation With a Known Cheater (Full Version). IACR Cryptol. ePrint Arch. 2023: 1744 (2023) - [i22]Najwa Aaraj, Abdelrahaman Aly, Tim Güneysu, Chiara Marcolla, Johannes Mono, Rogerio Paludo, Iván Santos-González, Mireia Scholz, Eduardo Soria-Vazquez, Victor Sucasas, Ajith Suresh:
FANNG-MPC: Framework for Artificial Neural Networks and Generic MPC. IACR Cryptol. ePrint Arch. 2023: 1918 (2023) - 2022
- [c11]Andreas Brüggemann, Thomas Schneider, Ajith Suresh, Hossein Yalame:
Poster: Efficient Three-Party Shuffling Using Precomputation. CCS 2022: 3331-3333 - [c10]Daniel Günther, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh:
Poster: Privacy-Preserving Epidemiological Modeling on Mobile Graphs. CCS 2022: 3351-3353 - [c9]Nishat Koti, Shravani Patil, Arpita Patra, Ajith Suresh:
Poster MPClan: : Protocol Suite for Privacy-Conscious Computations. CCS 2022: 3379-3381 - [c8]Nishat Koti, Arpita Patra, Rahul Rachuri, Ajith Suresh:
Tetrad: Actively Secure 4PC for Secure Training and Inference. NDSS 2022 - [i21]Gokulnath Pillai, Eikansh Gupta, Ajith Suresh, Vinod Ganapathy, Arpita Patra:
Privadome: Protecting Citizen Privacy from Delivery Drones. CoRR abs/2205.04961 (2022) - [i20]Daniel Günther, Marco Holz, Benjamin Judkewitz, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh:
Privacy-Preserving Epidemiological Modeling on Mobile Graphs. CoRR abs/2206.00539 (2022) - [i19]Nishat Koti, Shravani Patil, Arpita Patra, Ajith Suresh:
MPClan: Protocol Suite for Privacy-Conscious Computations. CoRR abs/2206.12224 (2022) - [i18]Yaniv Ben-Itzhak, Helen Möllering, Benny Pinkas, Thomas Schneider, Ajith Suresh, Oleksandr Tkachenko, Shay Vargaftik, Christian Weinert, Hossein Yalame, Avishay Yanai:
ScionFL: Secure Quantized Aggregation for Federated Learning. CoRR abs/2210.07376 (2022) - [i17]Nishat Koti, Shravani Patil, Arpita Patra, Ajith Suresh:
MPClan: Protocol Suite for Privacy-Conscious Computations. IACR Cryptol. ePrint Arch. 2022: 675 (2022) - 2021
- [c7]Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame:
SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation. HOST 2021: 147-157 - [c6]Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame:
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation. USENIX Security Symposium 2021: 2165-2182 - [c5]Nishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh:
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning. USENIX Security Symposium 2021: 2651-2668 - [i16]Nishat Koti, Arpita Patra, Rahul Rachuri, Ajith Suresh:
Tetrad: Actively Secure 4PC for Secure Training and Inference. CoRR abs/2106.02850 (2021) - [i15]Ajith Suresh:
MPCLeague: Robust MPC Platform for Privacy-Preserving Machine Learning. CoRR abs/2112.13338 (2021) - [i14]Nishat Koti, Arpita Patra, Rahul Rachuri, Ajith Suresh:
Tetrad: Actively Secure 4PC for Secure Training and Inference. IACR Cryptol. ePrint Arch. 2021: 755 (2021) - [i13]Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame:
SynCirc: Efficient Synthesis of Depth-Optimized Circuits for Secure Computation. IACR Cryptol. ePrint Arch. 2021: 1153 (2021) - 2020
- [j1]Megha Byali, Harsh Chaudhari, Arpita Patra, Ajith Suresh:
FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning. Proc. Priv. Enhancing Technol. 2020(2): 459-480 (2020) - [c4]Harsh Chaudhari, Rahul Rachuri, Ajith Suresh:
Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning. NDSS 2020 - [c3]Arpita Patra, Ajith Suresh:
BLAZE: Blazing Fast Privacy-Preserving Machine Learning. NDSS 2020 - [i12]Arpita Patra, Ajith Suresh:
BLAZE: Blazing Fast Privacy-Preserving Machine Learning. CoRR abs/2005.09042 (2020) - [i11]Nishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh:
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning. CoRR abs/2005.10296 (2020) - [i10]Arpita Patra, Ajith Suresh:
BLAZE: Blazing Fast Privacy-Preserving Machine Learning. IACR Cryptol. ePrint Arch. 2020: 42 (2020) - [i9]Nishat Koti, Mahak Pancholi, Arpita Patra, Ajith Suresh:
SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning. IACR Cryptol. ePrint Arch. 2020: 592 (2020) - [i8]Arpita Patra, Thomas Schneider, Ajith Suresh, Hossein Yalame:
ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation. IACR Cryptol. ePrint Arch. 2020: 1225 (2020)
2010 – 2019
- 2019
- [c2]Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh:
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction. CCSW 2019: 81-92 - [i7]Arpita Patra, Pratik Sarkar, Ajith Suresh:
Fast Actively Secure OT Extension for Short Secrets. CoRR abs/1911.08834 (2019) - [i6]Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh:
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction. CoRR abs/1912.02592 (2019) - [i5]Rahul Rachuri, Ajith Suresh:
Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning. CoRR abs/1912.02631 (2019) - [i4]Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh:
ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction. IACR Cryptol. ePrint Arch. 2019: 429 (2019) - [i3]Rahul Rachuri, Ajith Suresh:
Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning. IACR Cryptol. ePrint Arch. 2019: 1315 (2019) - [i2]Megha Byali, Harsh Chaudhari, Arpita Patra, Ajith Suresh:
FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning. IACR Cryptol. ePrint Arch. 2019: 1365 (2019) - 2017
- [c1]Arpita Patra, Pratik Sarkar, Ajith Suresh:
Fast Actively Secure OT Extension for Short Secrets. NDSS 2017 - 2016
- [i1]Arpita Patra, Pratik Sarkar, Ajith Suresh:
Fast Actively Secure OT Extension for Short Secrets. IACR Cryptol. ePrint Arch. 2016: 940 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-16 22:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint