| Cryptflow2: Practical 2-party secure inference D Rathee, M Rathee, N Kumar, N Chandran, D Gupta, A Rastogi, ... Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 476 | 2020 |
| Sirnn: A math library for secure rnn inference D Rathee, M Rathee, RKK Goli, D Gupta, R Sharma, N Chandran, ... 2021 IEEE Symposium on Security and Privacy (SP), 1003-1020, 2021 | 171 | 2021 |
| Secfloat: Accurate floating-point meets secure 2-party computation D Rathee, A Bhattacharya, R Sharma, D Gupta, N Chandran, A Rastogi 2022 IEEE Symposium on Security and Privacy (SP), 576-595, 2022 | 71 | 2022 |
| Improved multiplication triple generation over rings via RLWE-based AHE D Rathee, T Schneider, KK Shukla International conference on cryptology and network security, 347-359, 2019 | 51 | 2019 |
| Software defect prediction using K‐PCA and various kernel‐based extreme learning machine: an empirical study SK Pandey, D Rathee, AK Tripathi IET Software 14 (7), 768-782, 2020 | 44 | 2020 |
| ZEBRA: Anonymous Credentials with Practical On-chain Verification and Applications to KYC in DeFi. D Rathee, GV Policharla, T Xie, R Cottone, D Song IACR Cryptol. ePrint Arch. 2022, 1286, 2022 | 42 | 2022 |
| Faster PCA and linear regression through hypercubes in HElib D Rathee, PK Mishra, M Yasuda Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 42-53, 2018 | 38 | 2018 |
| Fast secure matrix multiplications over ring-based homomorphic encryption PK Mishra, D Rathee, DH Duong, M Yasuda Information Security Journal: A Global Perspective 30 (4), 219-234, 2021 | 33 | 2021 |
| Secure {Floating-Point} Training D Rathee, A Bhattacharya, D Gupta, R Sharma, D Song 32nd USENIX Security Symposium (USENIX Security 23), 6329-6346, 2023 | 27 | 2023 |
| Secure two-party computation in a quantum world N Büscher, D Demmler, NP Karvelas, S Katzenbeisser, J Krämer, ... International Conference on Applied Cryptography and Network Security, 461-480, 2020 | 21 | 2020 |
| Linear-complexity private function evaluation is practical M Holz, Á Kiss, D Rathee, T Schneider European Symposium on Research in Computer Security, 401-420, 2020 | 20 | 2020 |
| Zebra: snark-based anonymous credentials for practical, private and accountable on-chain access control D Rathee, GV Policharla, T Xie, R Cottone, D Song Cryptology ePrint Archive, 2022 | 18 | 2022 |
| Mpc-minimized secure llm inference D Rathee, D Li, I Stoica, H Zhang, R Popa arXiv preprint arXiv:2408.03561, 2024 | 15 | 2024 |
| SIRNN: A math library for secure inference of RNNs D Rathee, M Rathee, RKK Goli, D Gupta, R Sharma, N Chandran, ... IEEE S&P, 2021 | 11 | 2021 |
| Efficient protocols for private wildcards pattern matching TK Saha, D Rathee, T Koshiba Journal of Information Security and Applications 55, 102609, 2020 | 7 | 2020 |
| Private inference in deep neural network N Chandran, D Gupta, A Rastogi, R Sharma, N Kumar, M RATHEE, ... US Patent 12,346,830, 2025 | 2 | 2025 |
| Myco: Unlocking polylogarithmic accesses in metadata-private messaging D Kaviani, D Rathee, B Annem, RA Popa 2025 IEEE Symposium on Security and Privacy (SP), 4419-4437, 2025 | 2 | 2025 |
| Secure Two-Party Computation in a Quantum World S Katzenbeisser, J Krämer, D Rathee, T Schneider, P Struck | | |