Ilya Mironov

According to our database1, Ilya Mironov authored at least 73 papers between 2001 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Rényi Differential Privacy of the Sampled Gaussian Mechanism.
CoRR, 2019

That which we call private.
CoRR, 2019

Privacy-preserving Data Mining in Industry.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Privacy-preserving Data Mining in Industry.
Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, 2019

Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity.
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, 2019

2018
Incremental Deterministic Public-Key Encryption.
J. Cryptology, 2018

Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity.
CoRR, 2018

Privacy Amplification by Iteration.
CoRR, 2018

Scalable Private Learning with PATE.
CoRR, 2018

Scalable Private Learning with PATE.
Proceedings of the 6th International Conference on Learning Representations, 2018

Privacy Amplification by Iteration.
Proceedings of the 59th IEEE Annual Symposium on Foundations of Computer Science, 2018

2017
Strengthening the Security of Encrypted Databases: Non-Transitive JOINs.
IACR Cryptology ePrint Archive, 2017

Prochlo: Strong Privacy for Analytics in the Crowd.
CoRR, 2017

Oblivious Stash Shuffle.
CoRR, 2017

On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches.
CoRR, 2017

Renyi Differential Privacy.
CoRR, 2017

Strengthening the Security of Encrypted Databases: Non-transitive JOINs.
Proceedings of the Theory of Cryptography - 15th International Conference, 2017

Prochlo: Strong Privacy for Analytics in the Crowd.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

Rényi Differential Privacy.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

On the Protection of Private Information in Machine Learning Systems: Two Recent Approches.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

2016
Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE.
IACR Cryptology ePrint Archive, 2016

Deep Learning with Differential Privacy.
CoRR, 2016

Do Distributed Differentially-Private Protocols Require Oblivious Transfer?.
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016

Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Deep Learning with Differential Privacy.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Do Distributed Differentially-Private Protocols Require Oblivious Transfer?
IACR Cryptology ePrint Archive, 2015

Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines.
IACR Cryptology ePrint Archive, 2015

Message-Locked Encryption for Lock-Dependent Messages.
IACR Cryptology ePrint Archive, 2015

Cryptographic Reverse Firewalls.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Hosting Services on an Untrusted Cloud.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
Cryptographic Reverse Firewalls.
IACR Cryptology ePrint Archive, 2014

Web PKI: Closing the Gap between Guidelines and Practices.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Global Authentication in an Untrustworthy World.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

Message-Locked Encryption for Lock-Dependent Messages.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Incremental Deterministic Public-Key Encryption.
IACR Cryptology ePrint Archive, 2012

Differential Privacy with Imperfect Randomness.
IACR Cryptology ePrint Archive, 2012

Privacy via the Johnson-Lindenstrauss Transform
CoRR, 2012

Differential privacy as a protocol constraint.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

Incremental Deterministic Public-Key Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Differential Privacy with Imperfect Randomness.
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012

On significance of the least significant bits for differential privacy.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Sketching in Adversarial Environments.
SIAM J. Comput., 2011

The Limits of Two-Party Differential Privacy.
Electronic Colloquium on Computational Complexity (ECCC), 2011

Publicly Verifiable Secret Sharing for Cloud-Based Key Management.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

2010
Domain Extension for Enhanced Target Collision-Resistant Hash Functions.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

The Limits of Two-Party Differential Privacy.
Proceedings of the 51th Annual IEEE Symposium on Foundations of Computer Science, 2010

2009
Differentially Private Recommender Systems: Building Privacy into the Netflix Prize Contenders.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

Computational Differential Privacy.
Proceedings of the Advances in Cryptology, 2009

2008
Data Collection with Self-Enforcing Privacy.
ACM Trans. Inf. Syst. Secur., 2008

Sketching in adversarial environments.
Proceedings of the 40th Annual ACM Symposium on Theory of Computing, 2008

2007
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers.
Proceedings of the Topics in Cryptology, 2007

2006
Applications of SAT Solvers to Cryptanalysis of Hash Functions.
IACR Cryptology ePrint Archive, 2006

Hard Instances of the Constrained Discrete Logarithm Problem.
IACR Cryptology ePrint Archive, 2006

MV3: A new word based stream cipher using rapid mixing and revolving buffers.
IACR Cryptology ePrint Archive, 2006

Hard Instances of the Constrained Discrete Logarithm Problem
CoRR, 2006

MV3: A new word based stream cipher using rapid mixing and revolving buffers
CoRR, 2006

Applications of SAT Solvers to Cryptanalysis of Hash Functions.
Proceedings of the Theory and Applications of Satisfiability Testing, 2006

Collision-Resistant No More: Hash-and-Sign Paradigm Revisited.
Proceedings of the Public Key Cryptography, 2006

Our Data, Ourselves: Privacy Via Distributed Noise Generation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Cache-Collision Timing Attacks Against AES.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

Data collection with self-enforcing privacy.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

Hard Instances of the Constrained Discrete Logarithm Problem.
Proceedings of the Algorithmic Number Theory, 7th International Symposium, 2006

2003
A Secure Signature Scheme from Bilinear Maps.
Proceedings of the Topics in Cryptology, 2003

2002
(Not So) Random Shuffles of RC4.
IACR Cryptology ePrint Archive, 2002

Cryptographic Primitives Enforcing Communication and Storage Complexity.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

(Not So) Random Shuffles of RC4.
Proceedings of the Advances in Cryptology, 2002

2001
A Note on Cryptanalysis of the Preliminary Version of the NTRU Signature Scheme.
IACR Cryptology ePrint Archive, 2001

Incentives for Sharing in Peer-to-Peer Networks.
Proceedings of the Electronic Commerce, Second International Workshop, 2001

Incentives for sharing in peer-to-peer networks.
Proceedings of the Proceedings 3rd ACM Conference on Electronic Commerce (EC-2001), 2001

Hash Functions: From Merkle-Damgård to Shoup.
Proceedings of the Advances in Cryptology, 2001

Uncheatable Distributed Computations.
Proceedings of the Topics in Cryptology, 2001


  Loading...