Arkady Yerukhimovich

Orcid: 0000-0002-9045-748X

According to our database1, Arkady Yerukhimovich authored at least 33 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things.
IEEE Trans. Mob. Comput., May, 2024

2023
On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash Sketching.
IACR Cryptol. ePrint Arch., 2023

2022
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer.
IACR Cryptol. ePrint Arch., 2022

Secure Sampling with Sublinear Communication.
IACR Cryptol. ePrint Arch., 2022

2021
Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS).
IACR Cryptol. ePrint Arch., 2021

The More The Merrier: Reducing the Cost of Large Scale MPC.
IACR Cryptol. ePrint Arch., 2021

Compressed Oblivious Encoding for Homomorphically Encrypted Search.
IACR Cryptol. ePrint Arch., 2021

2020
Differentially-Private Multi-Party Sketching for Large-Scale Statistics.
Proc. Priv. Enhancing Technol., 2020

Tokoin: A Coin-Based Accountable Access Control Scheme for Internet of Things.
CoRR, 2020

Blockchain technology: what is it good for?
Commun. ACM, 2020

2019
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
J. Cryptol., 2019

SoK: Blockchain Technology and Its Potential Use Cases.
CoRR, 2019

Location Leakage from Network Access Patterns.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Stormy: Statistics in Tor by Measuring Securely.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Nothing But Net: Invading Android User Privacy Using Only Network Access Patterns.
CoRR, 2018

2017
Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions.
IACR Cryptol. ePrint Arch., 2017

SoK: Cryptographically Protected Database Search.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

2016
SoK: Privacy on Mobile Devices - It's Complicated.
Proc. Priv. Enhancing Technol., 2016

Cryptography for Big Data Security.
IACR Cryptol. ePrint Arch., 2016

CompGC: Efficient Offline/Online Semi-honest Two-party Computation.
IACR Cryptol. ePrint Arch., 2016

Secure Multiparty Computation for Cooperative Cyber Risk Assessment.
Proceedings of the IEEE Cybersecurity Development, 2016

2015
POPE: Partial Order-Preserving Encoding.
IACR Cryptol. ePrint Arch., 2015

Computing on Masked Data to improve the Security of Big Data.
CoRR, 2015

2014
A survey of cryptographic approaches to securing big-data analytics in the cloud.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2014

Computing on masked data: a high performance method for improving big data veracity.
Proceedings of the IEEE High Performance Extreme Computing Conference, 2014

2011
Impossibility of Blind Signatures from One-Way Permutations.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Limits of Computational Differential Privacy in the Client/Server Setting.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

2010
On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations.
Proceedings of the Progress in Cryptology, 2010

2009
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure.
IACR Cryptol. ePrint Arch., 2009

On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations.
Proceedings of the Advances in Cryptology, 2009

2006
Frequency Independent Flexible Spherical Beamforming Via Rbf Fitting.
Proceedings of the 2006 IEEE International Conference on Acoustics Speech and Signal Processing, 2006

2005
Efficient Data Storage in Large Nanoarrays.
Theory Comput. Syst., 2005


  Loading...