Stanislav Peceny

Orcid: 0009-0002-6247-4255

According to our database1, Stanislav Peceny authored at least 12 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Block-Accumulate Codes: Accelerated Linear Codes for PCGs and ZK.
IACR Cryptol. ePrint Arch., 2025

Efficient Permutation Correlations and Batched Random Access for Two-Party Computation.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Stationary Syndrome Decoding for Improved PCGs.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Prior-Based Label Differential Privacy via Secure Two-Party Computation.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025

2024
Logstar: Efficient Linear* Time Secure Merge.
IACR Cryptol. ePrint Arch., 2024

Communication-Efficient Secure Logistic Regression.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

2023
Fast ORAM with Server-Aided Preprocessing and Pragmatic Privacy-Efficiency Trade-Off.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2023

Towards Generic MPC Compilers via Variable Instruction Set Architectures (VISAs).
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2021
Masked Triples - Amortizing Multiplication Triples Across Conditionals.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Garbling, Stacked and Staggered - Faster k-out-of-n Garbled Function Evaluation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
MOTIF: (Almost) Free Branching in GMW - Via Vector-Scalar Multiplication.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2018
High-Precision Privacy-Preserving Real-Valued Function Evaluation.
Proceedings of the Financial Cryptography and Data Security, 2018


  Loading...