Kirill Morozov

Orcid: 0009-0006-4443-083X

According to our database1, Kirill Morozov authored at least 58 papers between 2001 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Using Untrusted and Unreliable Cloud Providers to Obtain Private Email.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Proof of Review: Trust Me, It's Been Reviewed.
Proceedings of the 5th Blockchain and Internet of Things Conference, 2023

Intrusion Detection for Additive Manufacturing Systems and Networks.
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023

2022
Revisiting group oriented secret sharing schemes.
Inf. Sci., 2022

Maintaining Review Credibility Using NLP, Reputation, and Blockchain.
Proceedings of the 4th IEEE International Conference on Trust, 2022

Towards a Threat Model and Security Analysis for Data Cooperatives.
Proceedings of the 19th International Conference on Security and Cryptography, 2022

Multi-Tier Reputation for Data Cooperatives.
Proceedings of the 3rd International Conference on Mathematical Research for Blockchain Economy, 2022

Making Blockchain Validators Honest.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022

2021
Group authentication for cloud-to-things computing: Review and improvement.
Comput. Networks, 2021

Investing Data with Untrusted Parties using HE.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

2020
EW<sub>256357</sub>: A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications' Security.
Proceedings of the Security and Privacy in Communication Networks, 2020

2019
Evaluation of Code-based Signature Schemes.
IACR Cryptol. ePrint Arch., 2019

Verifying OAuth Implementations Through Encrypted Network Analysis.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

CMCAP: Ephemeral Sandboxes for Adaptive Access Control.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

VSS Made Simpler.
Proceedings of the Advances in Information and Computer Security, 2019

Security Analysis and Efficient Implementation of Code-based Signature Schemes.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

On IND-CCA1 Security of Randomized McEliece Encryption in the Standard Model.
Proceedings of the Code-Based Cryptography - 7th International Workshop, 2019

Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.
Proceedings of the Information Security Practice and Experience, 2018

A Decentralized Marketplace Application on the Ethereum Blockchain.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

2017
Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions.
J. Supercomput., 2017

Secret Sharing with Cheaters Using Multi-Receiver Authentication.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM.
IACR Cryptol. ePrint Arch., 2017

Efficient outsourcing of secure k-nearest neighbour query over encrypted database.
Comput. Secur., 2017

CCA2 Key-Privacy for Code-Based Encryption in the Standard Model.
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017

Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation.
Proceedings of the Advances in Information and Computer Security, 2017

On unconditionally binding code-based commitment schemes.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Code-Based Zero-Knowledge Protocols and Their Applications.
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017

2016
Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services.
Int. J. Commun. Syst., 2016

Cross-group Secret Sharing for Secure Cloud Storage Service.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Note on Some Recent Cheater Identifiable Secret Sharing Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Zero-Knowledge Protocols for Code-Based Public-Key Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters.
IACR Cryptol. ePrint Arch., 2015

Parity Check based redistribution of secret shares.
Proceedings of the IEEE International Symposium on Information Theory, 2015

2014
LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces.
J. Supercomput., 2014

Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE.
Int. J. Netw. Secur., 2014

An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency.
IACR Cryptol. ePrint Arch., 2014

An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014

Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication.
Proceedings of the Advances in Information and Computer Security, 2014

2013
On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary.
Proceedings of the Advances in Information and Computer Security, 2013

Proof of plaintext knowledge for code-based public-key encryption revisited.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

On Zero-Knowledge Identification Based on Q-ary Syndrome Decoding.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Zero-Knowledge Protocols for the McEliece Encryption.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model.
IEEE Trans. Inf. Theory, 2011

Improvement on Secrecy Capacity of Wireless LAN Using Matched Filter.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Efficient computational oblivious transfer using interactive hashing.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2009
Computational Oblivious Transfer and Interactive Hashing.
IACR Cryptol. ePrint Arch., 2009

2008
Semantic security for the McEliece cryptosystem without random oracles.
Des. Codes Cryptogr., 2008

Coding-Based Oblivious Transfer.
Proceedings of the Mathematical Methods in Computer Science, 2008

A practical scheme for string commitment based on the Gaussian channel.
Proceedings of the 2008 IEEE Information Theory Workshop, 2008

2007
Oblivious Transfer via McEliece's PKC and Permuted Kernels.
IACR Cryptol. ePrint Arch., 2007

Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

2006
Efficient Protocols Achieving the Commitment Capacity of Noisy Correlations.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

On the Oblivious Transfer Capacity of the Erasure Channel.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

2004
Unfair Noisy Channels and Oblivious Transfer.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004

Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

2001
Generalized Oblivious Transfer Protocols Based on Noisy Channels.
Proceedings of the Information Assurance in Computer Networks: Methods, 2001


  Loading...