Practical secure aggregation for privacy-preserving machine learning K Bonawitz, V Ivanov, B Kreuter, A Marcedone, HB McMahan, S Patel, ... proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 3610 | 2017 |
Provably secure password-authenticated key exchange using Diffie-Hellman V Boyko, P MacKenzie, S Patel Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000 | 1078 | 2000 |
Practical secure aggregation for federated learning on user-held data K Bonawitz, V Ivanov, B Kreuter, A Marcedone, HB McMahan, S Patel, ... arXiv preprint arXiv:1611.04482, 2016 | 616 | 2016 |
Password-authenticated key exchange based on RSA P MacKenzie, S Patel, R Swaminathan International conference on the theory and application of cryptology and …, 2000 | 247 | 2000 |
Number theoretic attacks on secure password schemes S Patel Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997 | 181 | 1997 |
On deploying secure computing: Private intersection-sum-with-cardinality M Ion, B Kreuter, AE Nergiz, S Patel, S Saxena, K Seth, M Raykova, ... 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 370-389, 2020 | 169 | 2020 |
Protecting accounts from credential stuffing with password breach alerting K Thomas, J Pullman, K Yeo, A Raghunathan, PG Kelley, L Invernizzi, ... 28th USENIX Security Symposium (USENIX Security 19), 1556-1571, 2019 | 167 | 2019 |
Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing S Patel, G Persiano, K Yeo, M Yung Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 144 | 2019 |
{GRIMOIRE}: Synthesizing structure while fuzzing T Blazytko, M Bishop, C Aschermann, J Cappos, M Schlögel, N Korshun, ... 28th USENIX Security Symposium (USENIX Security 19), 1985-2002, 2019 | 136 | 2019 |
Private intersection-sum protocol with applications to attributing aggregate ad conversions M Ion, B Kreuter, E Nergiz, S Patel, S Saxena, K Seth, D Shanahan, ... Cryptology ePrint Archive, 2017 | 128 | 2017 |
Efficient authentication and key distribution in wireless IP networks L Salgarelli, M Buddhikot, J Garay, S Patel, S Miller IEEE Wireless Communications 10 (6), 52-61, 2003 | 123 | 2003 |
Downlink scheduling in CDMA data networks N Joshi, SR Kadaba, S Patel, GS Sundaram Proceedings of the 6th annual international conference on Mobile computing …, 2000 | 114 | 2000 |
PanORAMa: Oblivious RAM with logarithmic overhead S Patel, G Persiano, M Raykova, K Yeo 2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS …, 2018 | 108 | 2018 |
Storing encrypted objects U Shankar, A Kulik, B Moller, S Patel, BN Bershad, D Erb US Patent 8,601,263, 2013 | 107 | 2013 |
Square hash: Fast message authentication via optimized universal hash functions M Etzel, S Patel, Z Ramzan Annual International Cryptology Conference, 234-251, 1999 | 102 | 1999 |
An efficient discrete log pseudo random generator S Patel, GS Sundaram Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998 | 99 | 1998 |
{Communication–Computation} trade-offs in {PIR} A Ali, T Lepoint, S Patel, M Raykova, P Schoppmann, K Seth, K Yeo 30th USENIX security symposium (USENIX Security 21), 1811-1828, 2021 | 98 | 2021 |
Method for authenticating a mobile unit attached to a femtocell that operates according to code division multiple access TC Morgan, S Patel, RJ Thompson US Patent 8,428,554, 2013 | 84 | 2013 |
Method for establishing session key agreement S Patel US Patent 6,591,364, 2003 | 83 | 2003 |
Private stateful information retrieval S Patel, G Persiano, K Yeo Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 77 | 2018 |