Arkady Yerukhimovich

Orcid: 0000-0002-9045-748X

According to our database1, Arkady Yerukhimovich authored at least 39 papers between 2005 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Fully Adaptive FROST in the Algebraic Group Model From Falsifiable Assumptions.
IACR Cryptol. ePrint Arch., 2025

Non-Interactive Verifiable Aggregation.
IACR Cryptol. ePrint Arch., 2025

PQ-Hammer: End-to-End Key Recovery Attacks on Post-Quantum Cryptography Using Rowhammer.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

2024
TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things.
IEEE Trans. Mob. Comput., May, 2024

On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash.
IACR Commun. Cryptol., 2024

Multi-key Fully-Homomorphic Aggregate MAC for Arithmetic Circuits.
Proceedings of the Progress in Cryptology - INDOCRYPT 2024, 2024

2023
On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash Sketching.
IACR Cryptol. ePrint Arch., 2023

2022
Secure Sampling with Sublinear Communication.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS).
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
The More the Merrier: Reducing the Cost of Large Scale MPC.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Compressed Oblivious Encoding for Homomorphically Encrypted Search.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Differentially-Private Multi-Party Sketching for Large-Scale Statistics.
IACR Cryptol. ePrint Arch., 2020

Tokoin: A Coin-Based Accountable Access Control Scheme for Internet of Things.
CoRR, 2020

Blockchain technology: what is it good for?
Commun. ACM, 2020

2019
SoK: Blockchain Technology and Its Potential Use Cases.
CoRR, 2019

Location Leakage from Network Access Patterns.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Stormy: Statistics in Tor by Measuring Securely.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Nothing But Net: Invading Android User Privacy Using Only Network Access Patterns.
CoRR, 2018

2017
SoK: Cryptographically Protected Database Search.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

2016
SoK: Privacy on Mobile Devices - It's Complicated.
Proc. Priv. Enhancing Technol., 2016

Cryptography for Big Data Security.
IACR Cryptol. ePrint Arch., 2016

CompGC: Efficient Offline/Online Semi-honest Two-party Computation.
IACR Cryptol. ePrint Arch., 2016

Secure Multiparty Computation for Cooperative Cyber Risk Assessment.
Proceedings of the IEEE Cybersecurity Development, 2016

POPE: Partial Order Preserving Encoding.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Computing on Masked Data to improve the Security of Big Data.
CoRR, 2015

2014
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

A survey of cryptographic approaches to securing big-data analytics in the cloud.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2014

Computing on masked data: a high performance method for improving big data veracity.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2014

2011
A Study of Separations in Cryptography: New Results and New Models.
PhD thesis, 2011

Impossibility of Blind Signatures from One-Way Permutations.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Limits of Computational Differential Privacy in the Client/Server Setting.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

2010
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2010

On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations.
Proceedings of the Progress in Cryptology, 2010

2009
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations.
Proceedings of the Advances in Cryptology, 2009

2006
Frequency Independent Flexible Spherical Beamforming Via Rbf Fitting.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

2005
Efficient Data Storage in Large Nanoarrays.
Theory Comput. Syst., 2005


  Loading...