Ayantika Chatterjee

Orcid: 0000-0001-6368-0718

According to our database1, Ayantika Chatterjee authored at least 27 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Encrypted KNN Implementation on Distributed Edge Device Network.
IACR Cryptol. ePrint Arch., 2024

"Ask and Thou Shall Receive": Reaction-Based Full Key Recovery Attacks on FHE.
Proceedings of the Computer Security - ESORICS 2024, 2024

On the Security of Privacy-Preserving Machine Learning Against Model Stealing Attacks.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024

2023
Authorized Update in Multi-User Homomorphic Encrypted Cloud Database.
IEEE Trans. Knowl. Data Eng., August, 2023

FHEDA: Efficient Circuit Synthesis with Reduced Bootstrapping for Torus FHE.
IACR Cryptol. ePrint Arch., 2023

Model Stealing Attacks On FHE-based Privacy-Preserving Machine Learning through Adversarial Examples.
IACR Cryptol. ePrint Arch., 2023

vr<sup>2</sup>FHE- Securing FHE from Reaction-based Key Recovery Attacks.
IACR Cryptol. ePrint Arch., 2023

Democracy in Your Hands!: Practical Multi-key Homomorphic E-Voting.
Proceedings of the Information Systems Security - 19th International Conference, 2023

Work-in-Progress: Age of Information-Aware CACC for Vehicle Platooning.
Proceedings of the 2023 International Conference on embedded Wireless Systems and Networks, 2023

2022
Exploring Bitslicing Architectures for Enabling FHE-Assisted Machine Learning.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2022

Efficient Threshold FHE with Application to Real-Time Systems.
IACR Cryptol. ePrint Arch., 2022

Demystifying the comments made on "A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors".
IACR Cryptol. ePrint Arch., 2022

A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors.
IACR Cryptol. ePrint Arch., 2022

Error Leakage using Timing Channel in FHE Ciphertexts from TFHE Library.
IACR Cryptol. ePrint Arch., 2022

2021
Encrypted SQL Arithmetic Functions Processing for Secure Cloud Database.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2021

Encrypted Operator Design with Domain Aware Practical Performance Improvement.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021

2020
Sorting of Fully Homomorphic Encrypted Cloud Data: Can Partitioning be Effective?
IEEE Trans. Serv. Comput., 2020

2019
Encrypted Classification Using Secure K-Nearest Neighbour Computation.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2019

2018
Translating Algorithms to Handle Fully Homomorphic Encrypted Data on the Cloud.
IEEE Trans. Cloud Comput., 2018

2015
Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud.
IACR Cryptol. ePrint Arch., 2015

FURISC: FHE Encrypted URISC Design.
IACR Cryptol. ePrint Arch., 2015

Windowing technique for Lazy Sorting of Encrypted data.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2013
Accelerating Sorting of Fully Homomorphic Encrypted Data.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013

2012
Design of a high performance Binary Edwards Curve based processor secured against side channel analysis.
Integr., 2012

High-Speed Unified Elliptic Curve Cryptosystem on FPGAs Using Binary Huff Curves.
Proceedings of the Progress in VLSI Design and Test - 16th International Symposium, 2012

FPGA implementation of extended reconfigurable Binary Edwards Curve based processor.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

2011
FPGA implementation of binary edwards curve usingternary representation.
Proceedings of the 21st ACM Great Lakes Symposium on VLSI 2010, 2011


  Loading...