Valeria Nikolaenko

According to our database1, Valeria Nikolaenko authored at least 18 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Atomic and Fair Data Exchange via Blockchain.
IACR Cryptol. ePrint Arch., 2024

2023
STROBE: Streaming Threshold Random Beacons.
Proceedings of the 5th Conference on Advances in Financial Technologies, 2023

2022
Powers-of-Tau to the People: Decentralizing Setup Ceremonies.
IACR Cryptol. ePrint Arch., 2022

2021
Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2021

Homomorphic decryption in blockchains via compressed discrete-log lookup tables.
IACR Cryptol. ePrint Arch., 2021

Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures.
IACR Cryptol. ePrint Arch., 2021

2020
Distributed Auditing Proofs of Liabilities.
IACR Cryptol. ePrint Arch., 2020

Taming the many EdDSAs.
IACR Cryptol. ePrint Arch., 2020

2019
Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems.
IACR Cryptol. ePrint Arch., 2019

2017
Studies in secure computation: post-quantum, attribute-based and multi-party.
PhD thesis, 2017

Practical post-quantum key agreement from generic lattices (invited talk).
Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, 2017

Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE.
IACR Cryptol. ePrint Arch., 2016

2014
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits.
IACR Cryptol. ePrint Arch., 2014

2013
Attribute-Based Encryption for Arithmetic Circuits.
IACR Cryptol. ePrint Arch., 2013

Privacy-Preserving Ridge Regression on Hundreds of Millions of Records.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Privacy-preserving matrix factorization.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2011
Optimal heuristic algorithms for the image of an injective function.
Electron. Colloquium Comput. Complex., 2011


  Loading...