Vladimir Kolesnikov

According to our database1, Vladimir Kolesnikov authored at least 70 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Perennial secure multi-party computation of universal Turing machine.
Theor. Comput. Sci., 2019

Scalable Private Set Union from Symmetric-Key Techniques.
IACR Cryptology ePrint Archive, 2019

2018
Resilient End-to-End Message Protection for Cyber-Physical System Communications.
IEEE Trans. Smart Grid, 2018

Free IF: How to Omit Inactive Branches and Implement S-Universal Garbled Circuit (Almost) for Free.
IACR Cryptology ePrint Archive, 2018

Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures.
IACR Cryptology ePrint Archive, 2018

Covert Security with Public Verifiability: Faster, Leaner, and Simpler.
IACR Cryptology ePrint Archive, 2018

A Pragmatic Introduction to Secure Multi-Party Computation.
Foundations and Trends in Privacy and Security, 2018

$$\mathsf {Free\ }{} \mathtt{IF} $$ : How to Omit Inactive Branches and Implement S -Universal Garbled Circuit (Almost) for Free.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
SWiM: Secure Wildcard Pattern Matching From OT Extension.
IACR Cryptology ePrint Archive, 2017

DUPLO: Unifying Cut-and-Choose for Garbled Circuits.
IACR Cryptology ePrint Archive, 2017

Practical Multi-party Private Set Intersection from Symmetric-Key Techniques.
IACR Cryptology ePrint Archive, 2017

Hashing Garbled Circuits for Free.
IACR Cryptology ePrint Archive, 2017

Overlaying Conditional Circuit Clauses for Secure Computation.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
MAC Precomputation with Applications to Secure Memory.
ACM Trans. Priv. Secur., 2016

Efficient Batched Oblivious PRF with Applications to Private Set Intersection.
IACR Cryptology ePrint Archive, 2016

Attribute-based Key Exchange with General Policies.
IACR Cryptology ePrint Archive, 2016

Overlaying Circuit Clauses for Secure Computation.
IACR Cryptology ePrint Archive, 2016

2015
Richer Efficiency/Security Trade-offs in 2PC.
IACR Cryptology ePrint Archive, 2015

Public Verifiability in the Covert Model (Almost) for Free.
IACR Cryptology ePrint Archive, 2015

Amortizing Garbled Circuits.
IACR Cryptology ePrint Archive, 2015

Love All, Trust Few: on Trusting Intermediaries in HTTP.
Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization, 2015

On Cut-and-Choose Oblivious Transfer and Its Variants.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
FleXOR: Flexible garbling for XOR gates that beats free-XOR.
IACR Cryptology ePrint Archive, 2014

Malicious-Client Security in Blind Seer: A Scalable Private DBMS.
IACR Cryptology ePrint Archive, 2014

Blind Seer: A Scalable Private DBMS.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Efficient Network-Based Enforcement of Data Access Rights.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

2013
A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design.
Journal of Computer Security, 2013

Improved OT Extension for Transferring Short Secrets.
IACR Cryptology ePrint Archive, 2013

Towards Efficient Private Distributed Computation on Unbounded Input Streams.
IACR Cryptology ePrint Archive, 2013

Secure Key Exchange and Sessions Without Credentials.
IACR Cryptology ePrint Archive, 2013

TSAF: Tamper-resistant and scalable mutual authentication framework for plug-in EV charging.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract).
Proceedings of the Applied Cryptography and Network Security, 2013

2012
MAC aggregation protocols resilient to DoS attacks.
IJSN, 2012

Efficient Private Distributed Computation on Unbounded Input Streams
CoRR, 2012

On The Limits of Privacy Provided by Order-Preserving Encryption.
Bell Labs Technical Journal, 2012

Brief Announcement: Efficient Private Distributed Computation on Unbounded Input Streams.
Proceedings of the Distributed Computing - 26th International Symposium, 2012

Resilient end-to-end message protection for large-scale cyber-physical system communications.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

MAC Aggregation with Message Multiplicity.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Secure two-party computation in sublinear (amortized) time.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

2011
Securing Host-Based Mobility and Multi-Homing Protocols against On-Path Attackers.
JCM, 2011

IBAKE: Identity-Based Authenticated Key Exchange Protocol.
IACR Cryptology ePrint Archive, 2011

Secure Computation with Sublinear Amortized Work.
IACR Cryptology ePrint Archive, 2011

A Survey and Analysis of Media Keying Techniques in the Session Initiation Protocol (SIP).
IEEE Communications Surveys and Tutorials, 2011

MAC aggregation resilient to DoS attacks.
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011

SSTP: A scalable and secure transport protocol for smart grid data collection.
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011

Secret Sharing Krohn-Rhodes: Private and Perennial Distributed Computation.
Proceedings of the Innovations in Computer Science, 2011

2010
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version).
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010

From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design.
IACR Cryptology ePrint Archive, 2010

A Security Enhancement and Proof for Authentication and Key Agreement (AKA).
IACR Cryptology ePrint Archive, 2010

Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
IACR Cryptology ePrint Archive, 2010

A secure decentralized data-centric information infrastructure for smart grid.
IEEE Communications Magazine, 2010

Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

Brief announcement: swarming secrets.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

A secure and lightweight scheme for media keying in the session initiation protocol (SIP): work in progress.
Proceedings of the Principles, 2010

Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version).
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
One-round secure comparison of integers.
J. Mathematical Cryptology, 2009

Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
IACR Cryptology ePrint Archive, 2009

Embedded SFE: Offloading Server and Network using Hardware Tokens.
IACR Cryptology ePrint Archive, 2009

Secure Evaluation of Private Linear Branching Programs with Medical Applications.
IACR Cryptology ePrint Archive, 2009

Advances and impact of secure function evaluation.
Bell Labs Technical Journal, 2009

Efficient privacy-preserving classification of ECG signals.
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009

2008
Password Mistyping in Two-Factor-Authenticated Key Exchange.
IACR Cryptology ePrint Archive, 2008

Improved Garbled Circuit: Free XOR Gates and Applications.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

A Practical Universal Circuit Construction and Secure Evaluation of Private Functions.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

2006
Key Exchange Using Passwords and Long Keys.
IACR Cryptology ePrint Archive, 2006

Conditional Encrypted Mapping and Comparing Encrypted Numbers.
Proceedings of the Financial Cryptography and Data Security, 2006

2005
Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation.
Proceedings of the Advances in Cryptology, 2005

2004
Strong Conditional Oblivious Transfer and Computing on Intervals.
Proceedings of the Advances in Cryptology, 2004


  Loading...