Follow
Sarvar Patel
Sarvar Patel
Verified email at google.com
Title
Cited by
Cited by
Year
Practical secure aggregation for privacy-preserving machine learning
K Bonawitz, V Ivanov, B Kreuter, A Marcedone, HB McMahan, S Patel, ...
proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
28612017
Provably secure password-authenticated key exchange using Diffie-Hellman
V Boyko, P MacKenzie, S Patel
Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000
10412000
Practical secure aggregation for federated learning on user-held data
K Bonawitz, V Ivanov, B Kreuter, A Marcedone, HB McMahan, S Patel, ...
arXiv preprint arXiv:1611.04482, 2016
4772016
Password-authenticated key exchange based on RSA
P MacKenzie, S Patel, R Swaminathan
International conference on the theory and application of cryptology and …, 2000
2432000
Number theoretic attacks on secure password schemes
S Patel
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097 …, 1997
1801997
Protecting accounts from credential stuffing with password breach alerting
K Thomas, J Pullman, K Yeo, A Raghunathan, PG Kelley, L Invernizzi, ...
28th USENIX Security Symposium (USENIX Security 19), 1556-1571, 2019
1332019
On deploying secure computing: Private intersection-sum-with-cardinality
M Ion, B Kreuter, AE Nergiz, S Patel, S Saxena, K Seth, M Raykova, ...
2020 IEEE European Symposium on Security and Privacy (EuroS&P), 370-389, 2020
1282020
Efficient authentication and key distribution in wireless IP networks
L Salgarelli, M Buddhikot, J Garay, S Patel, S Miller
IEEE Wireless Communications 10 (6), 52-61, 2003
1222003
Downlink scheduling in CDMA data networks
N Joshi, SR Kadaba, S Patel, GS Sundaram
Proceedings of the 6th annual international conference on Mobile computing …, 2000
1142000
Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing
S Patel, G Persiano, K Yeo, M Yung
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1102019
{GRIMOIRE}: Synthesizing structure while fuzzing
T Blazytko, M Bishop, C Aschermann, J Cappos, M Schlögel, N Korshun, ...
28th USENIX Security Symposium (USENIX Security 19), 1985-2002, 2019
1092019
Private intersection-sum protocol with applications to attributing aggregate ad conversions
M Ion, B Kreuter, E Nergiz, S Patel, S Saxena, K Seth, D Shanahan, ...
Cryptology ePrint Archive, 2017
1062017
Storing encrypted objects
U Shankar, A Kulik, B Moller, S Patel, BN Bershad, D Erb
US Patent 8,601,263, 2013
1032013
Square hash: Fast message authentication via optimized universal hash functions
M Etzel, S Patel, Z Ramzan
Annual International Cryptology Conference, 234-251, 1999
1021999
An efficient discrete log pseudo random generator
S Patel, GS Sundaram
Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998
951998
PanORAMa: Oblivious RAM with logarithmic overhead
S Patel, G Persiano, M Raykova, K Yeo
2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS …, 2018
932018
Method for authenticating a mobile unit attached to a femtocell that operates according to code division multiple access
TC Morgan, S Patel, RJ Thompson
US Patent 8,428,554, 2013
832013
Method for establishing session key agreement
S Patel
US Patent 6,591,364, 2003
832003
{Communication–Computation} Trade-offs in {PIR}
A Ali, T Lepoint, S Patel, M Raykova, P Schoppmann, K Seth, K Yeo
30th USENIX Security Symposium (USENIX Security 21), 1811-1828, 2021
742021
Network enforced access control for femtocells
TC Morgan, S Patel, GS Sundaram, RJ Thompson
US Patent App. 12/019,967, 2009
662009
The system can't perform the operation now. Try again later.
Articles 1–20