Vladimir Kolesnikov

From MaRDI portal
Person:1703936


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Malicious security for SCALES. Outsourced computation with ephemeral servers
 
2024-12-13Paper
Garbled circuit lookup tables with logarithmic number of ciphertexts
 
2024-11-13Paper
Tri-state circuits. A circuit model that captures RAM
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
SCALES. MPC with small clients and larger ephemeral servers
Theory of Cryptography
2023-08-14Paper
PrORAM
Lecture Notes in Computer Science
2023-05-26Paper
Garbling, stacked and staggered. Faster \(k\)-out-of-\(n\) garbled function evaluation
Lecture Notes in Computer Science
2023-05-12Paper
\texttt{MOTIF}: (almost) free branching in GMW. Via vector-scalar multiplication
 
2023-03-29Paper
Stacked garbling. Garbled circuit proportional to longest execution path
 
2022-11-09Paper
\textsc{EpiGRAM}: practical garbled RAM
 
2022-08-30Paper
Garbled circuits with sublinear evaluator
 
2022-08-30Paper
Masked triples. Amortizing multiplication triples across conditionals
 
2021-12-21Paper
\textsf{LogStack}: stacked garbling with \(O(b \log b)\) computation
 
2021-12-08Paper
Stacked garbling for disjunctive zero-knowledge proofs
 
2021-12-01Paper
SWiM: secure wildcard pattern matching from OT extension
 
2021-03-17Paper
Scalable private set union from symmetric-key techniques
 
2020-05-05Paper
Covert security with public verifiability: faster, leaner, and simpler
 
2020-02-04Paper
Perennial secure multi-party computation of universal Turing machine
Theoretical Computer Science
2019-04-23Paper
Free IF: how to omit inactive branches and implement \(\mathcal{S}\)-universal garbled circuit (almost) for free
 
2019-01-23Paper
Overlaying conditional circuit clauses for secure computation
 
2018-03-08Paper
Hashing garbled circuits for free
Lecture Notes in Computer Science
2017-06-23Paper
On cut-and-choose oblivious transfer and its variants
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Public verifiability in the covert model (almost) for free
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
Towards efficient private distributed computation on unbounded input streams
Journal of Mathematical Cryptology
2015-08-07Paper
Richer Efficiency/Security Trade-offs in 2PC
Theory of Cryptography
2015-07-06Paper
Secure Key Exchange and Sessions without Credentials
Lecture Notes in Computer Science
2014-10-14Paper
Efficient network-based enforcement of data access rights
Lecture Notes in Computer Science
2014-10-14Paper
Flexor: Flexible garbling for XOR gates that beats free-XOR
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Amortizing Garbled Circuits
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Improved OT extension for transferring short secrets
Advances in Cryptology – CRYPTO 2013
2013-09-17Paper
Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits
Lecture Notes in Computer Science
2012-09-25Paper
MAC aggregation with message multiplicity
Lecture Notes in Computer Science
2012-09-25Paper
A security enhancement and proof for authentication and key agreement (AKA)
Lecture Notes in Computer Science
2010-09-10Paper
Truly efficient string oblivious transfer using resettable tamper-proof tokens
Theory of Cryptography
2010-02-24Paper
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima
Cryptology and Network Security
2009-11-26Paper
One-round secure comparison of integers
Journal of Mathematical Cryptology
2009-06-12Paper
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions
Financial Cryptography and Data Security
2009-02-12Paper
Conditional Encrypted Mapping and Comparing Encrypted Numbers
Financial Cryptography and Data Security
2008-09-09Paper
Improved Garbled Circuit: Free XOR Gates and Applications
Automata, Languages and Programming
2008-08-19Paper
Password Mistyping in Two-Factor-Authenticated Key Exchange
Automata, Languages and Programming
2008-08-19Paper
Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation
Lecture Notes in Computer Science
2008-03-18Paper
Theory of Cryptography
Lecture Notes in Computer Science
2007-02-12Paper
Strong Conditional Oblivious Transfer and Computing on Intervals
 
2005-08-12Paper


Research outcomes over time


This page was built for person: Vladimir Kolesnikov