Kirill Morozov

According to our database1, Kirill Morozov authored at least 50 papers between 2001 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Evaluation of Code-based Signature Schemes.
IACR Cryptology ePrint Archive, 2019

Verifying OAuth Implementations Through Encrypted Network Analysis.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

CMCAP: Ephemeral Sandboxes for Adaptive Access Control.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

VSS Made Simpler.
Proceedings of the Advances in Information and Computer Security, 2019

Security Analysis and Efficient Implementation of Code-based Signature Schemes.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

On IND-CCA1 Security of Randomized McEliece Encryption in the Standard Model.
Proceedings of the Code-Based Cryptography - 7th International Workshop, 2019

2018
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.
Proceedings of the Information Security Practice and Experience, 2018

A Decentralized Marketplace Application on the Ethereum Blockchain.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

2017
Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions.
The Journal of Supercomputing, 2017

Secret Sharing with Cheaters Using Multi-Receiver Authentication.
IEICE Transactions, 2017

A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM.
IACR Cryptology ePrint Archive, 2017

A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM.
CoRR, 2017

Efficient outsourcing of secure k-nearest neighbour query over encrypted database.
Computers & Security, 2017

CCA2 Key-Privacy for Code-Based Encryption in the Standard Model.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation.
Proceedings of the Advances in Information and Computer Security, 2017

On unconditionally binding code-based commitment schemes.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Code-Based Zero-Knowledge Protocols and Their Applications.
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017

2016
Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services.
Int. J. Communication Systems, 2016

Cross-group Secret Sharing for Secure Cloud Storage Service.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters.
Proceedings of the Information Theoretic Security - 9th International Conference, 2016

Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Note on Some Recent Cheater Identifiable Secret Sharing Schemes.
IEICE Transactions, 2015

Zero-Knowledge Protocols for Code-Based Public-Key Encryption.
IEICE Transactions, 2015

Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters.
IACR Cryptology ePrint Archive, 2015

Parity Check based redistribution of secret shares.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2014
LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces.
The Journal of Supercomputing, 2014

Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE.
I. J. Network Security, 2014

An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency.
IACR Cryptology ePrint Archive, 2014

An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014

Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication.
Proceedings of the Advances in Information and Computer Security, 2014

2013
On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary.
Proceedings of the Advances in Information and Computer Security, 2013

Proof of plaintext knowledge for code-based public-key encryption revisited.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

On Zero-Knowledge Identification Based on Q-ary Syndrome Decoding.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Zero-Knowledge Protocols for the McEliece Encryption.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model.
IEEE Trans. Information Theory, 2011

Improvement on Secrecy Capacity of Wireless LAN Using Matched Filter.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Efficient computational oblivious transfer using interactive hashing.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2009
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model.
IACR Cryptology ePrint Archive, 2009

Computational Oblivious Transfer and Interactive Hashing.
IACR Cryptology ePrint Archive, 2009

Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE.
Proceedings of the Applied Algebra, 2009

2008
Semantic security for the McEliece cryptosystem without random oracles.
Des. Codes Cryptogr., 2008

Coding-Based Oblivious Transfer.
Proceedings of the Mathematical Methods in Computer Science, 2008

A practical scheme for string commitment based on the Gaussian channel.
Proceedings of the 2008 IEEE Information Theory Workshop, 2008

2007
Oblivious Transfer via McEliece's PKC and Permuted Kernels.
IACR Cryptology ePrint Archive, 2007

Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

2006
Efficient Protocols Achieving the Commitment Capacity of Noisy Correlations.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

On the Oblivious Transfer Capacity of the Erasure Channel.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

2004
Unfair Noisy Channels and Oblivious Transfer.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004

Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

2001
Generalized Oblivious Transfer Protocols Based on Noisy Channels.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001


  Loading...