Amit Datta

Amit Datta
Carnegie Mellon University | CMU · Department of Electrical and Computer Engineering

Doctor of Philosophy

About

9
Publications
2,539
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
512
Citations
Additional affiliations
May 2012 - present
Max Planck Institute for Software Systems Kaiserslautern/Saarbruecken
Position
  • Oblivious RAM
August 2011 - April 2012
Indian Institute of Technology Kharagpur
Position
  • Hardware based improvements on Fully Homomorphic Encryption
May 2011 - July 2011
Max Planck Institute for Software Systems Kaiserslautern/Saarbruecken
Position
  • Asynchronous Verifiable Secret Sharing in Optimal Complexity
Education
July 2008 - August 2012
Indian Institute of Technology Kharagpur
Field of study
  • Computer Science and Engineering

Publications

Publications (9)
Article
Full-text available
A dataset has been classified by some unknown classifier into two types of points. What were the most important factors in determining the classification outcome? In this work, we employ an axiomatic approach in order to uniquely characterize an influence measure: a function that, given a set of classified points, outputs a value for each feature c...
Article
Full-text available
To partly address people’s concerns over web tracking, Google has created the Ad Settings webpage to provide information about and some choice over the profiles Google creates on users. We present AdFisher, an automated tool that explores how user behaviors, Google’s ads, and Ad Settings interact. AdFisher can run browser-based experiments and anal...
Article
Full-text available
To partly address people's concerns over web tracking, Google has created the Ad Settings webpage to provide information about and some choice over the profiles Google creates on users. We present AdFisher, an automated tool that explores how user behaviors, Google's ads, and Ad Settings interact. Our tool uses a rigorous experimental design and an...
Article
Full-text available
Information flow analysis has largely ignored the setting where the analyst has neither control over nor a complete model of the analyzed system. We formalize such limited information flow analyses and study an instance of it: detecting the usage of data by websites. We prove that these problems are ones of causal inference. Leveraging this connect...
Conference Paper
Full-text available
Verifiable secret sharing (VSS) is a vital primitive in secure distributed computing. It allows an untrusted dealer to verifiably share a secret among n parties in the presence of an adversary controlling at most t of them. VSS in the synchronous communication model has received tremendous attention in the cryptographic research community. Neverthe...
Article
Full-text available
This work attempts to develop a method for SLAM using semantics based on FastSLAM 2.0. Our approach to semantic mapping consists of segmenting images obtained from two sensors (optical and radar) aboard a UAV. We then identify landmarks within the segmented image, followed by the construction of relational trees with the landmarks; these trees are...
Conference Paper
Full-text available
Reported results on cache trace attacks on CLEFIA do not work with increased cache line size. In this paper we present an enhanced cache trace attack on CLEFIA using the differential property of the s-boxes of the cipher and the diffusion properties of the linear transformations of the underlying Feistel structures. The attack requires 3 round keys...
Chapter
Full-text available
CAMELLIA is a 128 bit block cipher certified for its security by NESSIE and CRYPTREC. Yet an implementation of CAMELLIA can easily fall prey to cache attacks. In this paper we present an attack on CAMELLIA, which utilizes cache access patterns along with the differential properties of CAMELLIA's s-boxes. The attack, when implemented on a PowerPC mi...

Network

Cited By