Kartik Nayak


I am a fourth year Ph.D. student in the Computer Science Department at the University Of Maryland, College Park. I am advised by Professor Jonathan Katz and Professor Elaine Shi.

I am a recipient of the 2016 Google PhD fellowship in Security.

Research Interests

I am interested in security and applied cryptography. More specifically, I am working to improve the efficiency of privacy-preserving computation by improving oblivious RAMs, secure multiparty computation, designing secure processors. I am also interested in working on blockchains.


Asymptotically Tight Bounds for Composing ORAM with PIR
Published in Public Key Cryptography (PKC), 2017
*Ittai Abraham, Christopher W. Fletcher, Kartik Nayak, Benny Pinkas, Ling Ren (* denotes author names in alphabetical order)

HOP: Hardware makes Obfuscation Practical
Published in Network and Distributed System Security (NDSS), 2017
Kartik Nayak, Christopher W. Fletcher, Ling Ren, Nishanth Chandran, Satya Lokam, Elaine Shi, Vipul Goyal

Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack
Paper | Code | Slides
Published in IEEE European Symposium on Security and Privacy (Euro S&P), 2016
Kartik Nayak*, Srijan Kumar*, Andrew Miller, Elaine Shi (* denotes equal contribution)

GraphSC: Parallel Secure Computation Made Easy
Paper | Code | Slides | Video
Published in IEEE Symposium on Security and Privacy (S&P), 2015
Kartik Nayak, Xiao Shaun Wang, Stratis Ioannidis, Udi Weinsberg, Nina Taft, Elaine Shi

ObliVM: A Programming Framework for Secure Computation
Paper | Code
Published in IEEE Symposium on Security and Privacy (S&P), 2015
1st place in NYU-Poly CSAW Applied Security Research Best Paper Competition
Chang Liu, Xiao Shaun Wang, Kartik Nayak, Yan Huang, Elaine Shi

Oblivious Data Structures
Paper | Slides
Published in ACM Conference on Computer and Communications Security (CCS), 2014
Finalist in NYU-Poly CSAW Applied Security Research Best Paper Competition
Xiao Shaun Wang, Kartik Nayak, Chang Liu, T-H Hubert Chan, Elaine Shi, Emil Stefanov, Yan Huang

Some Vulnerabilities are Different than Others: Studying Vulnerabilities and Attack Surfaces in the Wild
Paper | Announcement | Slides | Video
Published in 17th International Symposium on Research in Attacks, Intrusions and Defenses
Kartik Nayak, Daniel Marino, Petros Efstathopoulos, Tudor Dumitras

Helping Johnny Encrypt: Toward Semantic Interfaces for Cryptography Frameworks
Published in Onward! 2016
Soumya Indela, Mukul Kulkarni, Kartik Nayak, Tudor Dumitras


Practical Synchronous Byzantine Consensus
Ling Ren, Kartik Nayak, Ittai Abraham, Srinivas Devadas

Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless Byzantine Consensus
*Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, Alexander Spiegelman (* denotes author names in alphabetical order)

An Oblivious Parallel RAM with O(log^2 N) Parallel Runtime Blowup
Kartik Nayak, Jonathan Katz


Work Experience

VMware Research, Palo Alto, June - August 2016
Worked on blockchains and Oblivious RAMs
Mentors: Ittai Abraham, Dahlia Malkhi, Benny Pinkas

Microsoft Research, Bangalore, India, June - August 2015
Worked towards designing a secure processor to achieve VBB obfuscation of RAM programs
Mentors: Vipul Goyal, Satya Lokam, Nishanth Chandran

Technicolor Research, Los Altos, June - August 2014
Worked towards parallel secure computation frame work for graph parallel algorithms
Mentors: Stratis Ioannidis, Udi Weinsberg, Nina Taft

Google India, Bangalore, July 2011 - June 2013
Worked towards reducing spam from Google Apps for business

Microsoft IDC, Hyderabad, May - July 2010
Worked towards designing a Bluetooth clicker for a powerpoint presentation using Bluetooth HID profile on Windows 6.5 mobile phones


iDash Secure Genome Analysis Competition, March 2015
Won an HLI Award for Secure Multiparty Computing
Code | Report