default search action
Ayantika Chatterjee
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
On the Security of Privacy-Preserving Machine Learning Against Model Stealing Attacks. CANS (2) 2024: 96-117 - [c14]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
"Ask and Thou Shall Receive": Reaction-Based Full Key Recovery Attacks on FHE. ESORICS (4) 2024: 457-477 - [c13]Animesh Singh, Smita Das, Anirban Chakraborty, Rajat Sadhukhan, Ayantika Chatterjee, Debdeep Mukhopadhyay:
FHEDA: Efficient Circuit Synthesis with Reduced Bootstrapping for Torus FHE. EuroS&P 2024: 841-859 - [c12]B. Pradeep Kumar Reddy, Ruchika Meel, Ayantika Chatterjee:
Encrypted KNN Implementation on Distributed Edge Device Network. SECRYPT 2024: 680-685 - [c11]Reeshav Chowdhury, Aman Kumar, Vaibhav Dashrath Mohite, Ayantika Chatterjee:
Transferability of Evasion Attacks Against FHE Encrypted Inference - Official Work-in-Progress Paper. SPACE 2024: 40-68 - [i11]B. Pradeep Kumar Reddy, Ruchika Meel, Ayantika Chatterjee:
Encrypted KNN Implementation on Distributed Edge Device Network. IACR Cryptol. ePrint Arch. 2024: 648 (2024) - [i10]Amit Jana, Smita Das, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Related-Key Cryptanalysis of FUTURE. IACR Cryptol. ePrint Arch. 2024: 1614 (2024) - 2023
- [j5]Tanusree Parbat, Ayantika Chatterjee:
Authorized Update in Multi-User Homomorphic Encrypted Cloud Database. IEEE Trans. Knowl. Data Eng. 35(8): 7796-7808 (2023) - [c10]Gulabi Mandal, Anik Roy, Ayantika Chatterjee, Soumyajit Dey:
Work-in-Progress: Age of Information-Aware CACC for Vehicle Platooning. EWSN 2023: 285-288 - [c9]Tanusree Parbat, Aniket Banerjee, Ayantika Chatterjee:
Democracy in Your Hands!: Practical Multi-key Homomorphic E-Voting. ICISS 2023: 259-271 - [i9]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
vr2FHE- Securing FHE from Reaction-based Key Recovery Attacks. IACR Cryptol. ePrint Arch. 2023: 561 (2023) - [i8]Animesh Singh, Smita Das, Anirban Chakraborty, Rajat Sadhukhan, Ayantika Chatterjee, Debdeep Mukhopadhyay:
FHEDA: Efficient Circuit Synthesis with Reduced Bootstrapping for Torus FHE. IACR Cryptol. ePrint Arch. 2023: 1310 (2023) - [i7]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Model Stealing Attacks On FHE-based Privacy-Preserving Machine Learning through Adversarial Examples. IACR Cryptol. ePrint Arch. 2023: 1665 (2023) - 2022
- [j4]Soumik Sinha, Sayandeep Saha, Manaar Alam, Varun Agarwal, Ayantika Chatterjee, Anoop Mishra, Deepak Khazanchi, Debdeep Mukhopadhyay:
Exploring Bitslicing Architectures for Enabling FHE-Assisted Machine Learning. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(11): 4004-4015 (2022) - [i6]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Error Leakage using Timing Channel in FHE Ciphertexts from TFHE Library. IACR Cryptol. ePrint Arch. 2022: 685 (2022) - [i5]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors. IACR Cryptol. ePrint Arch. 2022: 1563 (2022) - [i4]Siddhartha Chowdhury, Sayani Sinha, Animesh Singh, Shubham Mishra, Chandan Chaudhary, Sikhar Patranabis, Pratyay Mukherjee, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Efficient Threshold FHE with Application to Real-Time Systems. IACR Cryptol. ePrint Arch. 2022: 1625 (2022) - [i3]Bhuvnesh Chaturvedi, Anirban Chakraborty, Ayantika Chatterjee, Debdeep Mukhopadhyay:
Demystifying the comments made on "A Practical Full Key Recovery Attack on TFHE and FHEW by Inducing Decryption Errors". IACR Cryptol. ePrint Arch. 2022: 1741 (2022) - 2021
- [c8]Ayan Ghosh, Abhishek Raj, Ayantika Chatterjee:
Encrypted Operator Design with Domain Aware Practical Performance Improvement. ICMC 2021: 93-107 - [c7]Tanusree Parbat, Ayantika Chatterjee:
Encrypted SQL Arithmetic Functions Processing for Secure Cloud Database. SPACE 2021: 207-225 - 2020
- [j3]Ayantika Chatterjee, Indranil Sengupta:
Sorting of Fully Homomorphic Encrypted Cloud Data: Can Partitioning be Effective? IEEE Trans. Serv. Comput. 13(3): 545-558 (2020)
2010 – 2019
- 2019
- [c6]B. Pradeep Kumar Reddy, Ayantika Chatterjee:
Encrypted Classification Using Secure K-Nearest Neighbour Computation. SPACE 2019: 176-194 - 2018
- [j2]Ayantika Chatterjee, Indranil Sengupta:
Translating Algorithms to Handle Fully Homomorphic Encrypted Data on the Cloud. IEEE Trans. Cloud Comput. 6(1): 287-300 (2018) - 2015
- [c5]Ayantika Chatterjee, Indranil Sengupta:
Windowing technique for Lazy Sorting of Encrypted data. CNS 2015: 633-637 - [i2]Ayantika Chatterjee, Indranil Sengupta:
FURISC: FHE Encrypted URISC Design. IACR Cryptol. ePrint Arch. 2015: 699 (2015) - [i1]Ayantika Chatterjee, Indranil Sengupta:
Searching and Sorting of Fully Homomorphic Encrypted Data on Cloud. IACR Cryptol. ePrint Arch. 2015: 981 (2015) - 2013
- [c4]Ayantika Chatterjee, Manish Kaushal, Indranil Sengupta:
Accelerating Sorting of Fully Homomorphic Encrypted Data. INDOCRYPT 2013: 262-273 - 2012
- [j1]Ayantika Chatterjee, Indranil Sengupta:
Design of a high performance Binary Edwards Curve based processor secured against side channel analysis. Integr. 45(3): 331-340 (2012) - [c3]Ayantika Chatterjee, Indranil Sengupta:
FPGA implementation of extended reconfigurable Binary Edwards Curve based processor. ICNC 2012: 211-215 - [c2]Ayantika Chatterjee, Indranil Sengupta:
High-Speed Unified Elliptic Curve Cryptosystem on FPGAs Using Binary Huff Curves. VDAT 2012: 243-251 - 2011
- [c1]Ayantika Chatterjee, Indranil Sengupta:
FPGA implementation of binary edwards curve usingternary representation. ACM Great Lakes Symposium on VLSI 2011: 73-78
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-06 01:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint