Obserwuj
Sophia Yakoubov
Sophia Yakoubov
Zweryfikowany adres z cs.au.dk - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
A Decentralized Public Key Infrastructure with Identity Retention.
C Fromknecht, D Velicanu, S Yakoubov
IACR Cryptology ePrint Archive 2014, 803, 2014
3112014
Certcoin: A namecoin based decentralized authentication system
C Fromknecht, D Velicanu, S Yakoubov
Massachusetts Inst. Technol., Cambridge, MA, USA, Tech. Rep 6, 46-56, 2014
1752014
Accumulators with applications to anonymity-preserving revocation
F Baldimtsi, J Camenisch, M Dubovitskaya, A Lysyanskaya, L Reyzin, ...
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 301-315, 2017
1152017
A survey of cryptographic approaches to securing big-data analytics in the cloud
S Yakoubov, V Gadepally, N Schear, E Shen, A Yerukhimovich
2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014
912014
YOSO: You Only Speak Once
C Gentry, S Halevi, H Krawczyk, B Magri, JB Nielsen, T Rabin, ...
81*2021
The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT
C Orlandi, P Scholl, S Yakoubov
Cryptology ePrint Archive, Report 2021/262, 2021. https://eprint. iacr. org …, 0
70*
Efficient asynchronous accumulators for distributed PKI
L Reyzin, S Yakoubov
International Conference on Security and Cryptography for Networks, 292-309, 2016
652016
Fuzzy password-authenticated key exchange
PA Dupont, J Hesse, D Pointcheval, L Reyzin, S Yakoubov
Annual International Conference on the Theory and Applications of …, 2018
562018
Random-Index PIR and Applications
C Gentry, S Halevi, B Magri, JB Nielsen, S Yakoubov
Cryptology ePrint Archive, Report 2020/1248, 2020. https://eprint. iacr. org …, 2021
472021
A Gentle Introduction to Yao’s Garbled Circuits
S Yakoubov
37*
Cryptography for big data security
A Hamlin, N Schear, E Shen, M Varia, S Yakoubov, A Yerukhimovich
Big Data: Storage, Sharing, and Security (3S), 241-288, 2016
352016
HEtest: A homomorphic encryption testing framework
M Varia, S Yakoubov, Y Yang
International Conference on Financial Cryptography and Data Security, 213-230, 2015
352015
Catching MPC cheaters: Identification and openability
R Cunningham, B Fuller, S Yakoubov
Information Theoretic Security: 10th International Conference, ICITS 2017 …, 2017
342017
Turning HATE into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC
L Reyzin, A Smith, S Yakoubov
International Symposium on Cyber Security Cryptography and Machine Learning …, 2021
332021
Stronger security and constructions of multi-designated verifier signatures
I Damgård, H Haagh, R Mercer, A Nitulescu, C Orlandi, S Yakoubov
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020
222020
Automated assessment of secure search systems
M Varia, B Price, N Hwang, A Hamlin, J Herzog, J Poland, M Reschly, ...
ACM SIGOPS Operating Systems Review 49 (1), 22-30, 2015
192015
Secure Multiparty Computation for Cooperative Cyber Risk Assessment
K Hogan, N Luther, N Schear, E Shen, D Stott, S Yakoubov, ...
Cybersecurity Development (SecDev), IEEE, 75-76, 2016
182016
Universally composable accumulators
F Badimtsi, R Canetti, S Yakoubov
Cryptographers’ Track at the RSA Conference, 638-666, 2020
162020
Count me in! extendability for threshold ring signatures
DF Aranha, M Hall-Andersen, A Nitulescu, E Pagnin, S Yakoubov
IACR International Conference on Public-Key Cryptography, 379-406, 2022
152022
Stronger notions and a more efficient construction of threshold ring signatures
A Munch-Hansen, C Orlandi, S Yakoubov
International Conference on Cryptology and Information Security in Latin …, 2021
152021
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20