Valeria Nikolaenko

Orcid: 0009-0009-8431-6531

According to our database1, Valeria Nikolaenko authored at least 19 papers between 2011 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Data Availability Sampling with Repair.
IACR Cryptol. ePrint Arch., 2025

2024
Atomic and Fair Data Exchange via Blockchain.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Powers-of-Tau to the People: Decentralizing Setup Ceremonies.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
STROBE: Streaming Threshold Random Beacons.
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023

2021
Homomorphic Decryption in Blockchains via Compressed Discrete-Log Lookup Tables.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2021

Non-interactive Half-Aggregation of EdDSA and Variants of Schnorr Signatures.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Distributed Auditing Proofs of Liabilities.
IACR Cryptol. ePrint Arch., 2020

Taming the Many EdDSAs.
Proceedings of the Security Standardisation Research - 6th International Conference, 2020

Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems.
Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, 2020

2017
Studies in secure computation: post-quantum, attribute-based and multi-party.
PhD thesis, 2017

Practical post-quantum key agreement from generic lattices (invited talk).
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, 2017

Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2014
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

2013
Attribute-Based Encryption for Arithmetic Circuits.
IACR Cryptol. ePrint Arch., 2013

Privacy-Preserving Ridge Regression on Hundreds of Millions of Records.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Privacy-preserving matrix factorization.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2011
Optimal heuristic algorithms for the image of an injective function.
Electron. Colloquium Comput. Complex., 2011


  Loading...