Arkady Yerukhimovich
Orcid: 0000-0002-9045-748X
According to our database1,
Arkady Yerukhimovich
authored at least 39 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
PQ-Hammer: End-to-End Key Recovery Attacks on Post-Quantum Cryptography Using Rowhammer.
Proceedings of the IEEE Symposium on Security and Privacy, 2025
2024
IEEE Trans. Mob. Comput., May, 2024
IACR Commun. Cryptol., 2024
Proceedings of the Progress in Cryptology - INDOCRYPT 2024, 2024
2023
On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash Sketching.
IACR Cryptol. ePrint Arch., 2023
2022
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS).
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IACR Cryptol. ePrint Arch., 2020
CoRR, 2020
2019
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
CoRR, 2018
2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
2016
Proc. Priv. Enhancing Technol., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the IEEE Cybersecurity Development, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
2014
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014
Proceedings of the IEEE High Performance Extreme Computing Conference, 2014
Proceedings of the IEEE High Performance Extreme Computing Conference, 2014
2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
2010
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2010
Proceedings of the Progress in Cryptology, 2010
2009
Proceedings of the Advances in Cryptology, 2009
2006
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006
2005