Vladimir Shpilrain

Orcid: 0000-0003-2239-7996

According to our database1, Vladimir Shpilrain authored at least 75 papers between 1991 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cayley hashing with cookies.
IACR Cryptol. ePrint Arch., 2024

Complexity of some algorithmic problems in groups: a survey.
CoRR, 2024

2023
BASS: Boolean Automorphisms Signature Scheme.
IACR Cryptol. ePrint Arch., 2023

Tropical cryptography III: digital signatures.
IACR Cryptol. ePrint Arch., 2023

Digital signature schemes using non-square matrices or scrap automorphisms.
IACR Cryptol. ePrint Arch., 2023

2022
Linear average-case complexity of algorithmic problems in groups.
CoRR, 2022

On Single-Server Delegation of RSA.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022

A Survey on Delegated Computation.
Proceedings of the Developments in Language Theory - 26th International Conference, 2022

2021
A note on fully homomorphic encryption of real-life data.
Int. J. Comput. Math. Comput. Syst. Theory, 2021

RSA and redactable blockchains.
Int. J. Comput. Math. Comput. Syst. Theory, 2021

Probability theory and public-key cryptography.
Int. J. Comput. Math. Comput. Syst. Theory, 2021

MOBS (Matrices Over Bit Strings) public key exchange.
IACR Cryptol. ePrint Arch., 2021

MAKE: a Matrix Action Key Exchange.
IACR Cryptol. ePrint Arch., 2021

Single-Server Delegation of Ring Multiplications from Quasilinear-time Clients.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

2020
Efficient and Secure Delegation of Exponentiation in General Groups to a Single Malicious Server.
Math. Comput. Sci., 2020

Delegating a Product of Group Exponentiations with Application to Signature Schemes (Submission to Special NutMiC 2019 Issue of JMC).
J. Math. Cryptol., 2020

Secure and Efficient Delegation of Pairings with Online Inputs.
Proceedings of the Smart Card Research and Advanced Applications, 2020

Secure and Efficient Delegation of Elliptic-Curve Pairing.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Private naive bayes classification of personal biomedical data: Application in cancer data analysis.
Comput. Biol. Medicine, 2019

Secure Delegation to a Single Malicious Server: Exponentiation in RSA-type Groups.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Medical Diagnostics Based on Encrypted Medical Data.
Proceedings of the Bio-inspired Information and Communication Technologies, 2019

2018
Tropical cryptography II: extensions by homomorphisms.
IACR Cryptol. ePrint Arch., 2018

Practical private-key fully homomorphic encryption in rings.
Groups Complex. Cryptol., 2018

Problems in group theory motivated by cryptography.
CoRR, 2018

Private-Key Fully Homomorphic Encryption for Private Classification.
Proceedings of the Mathematical Software - ICMS 2018, 2018

Efficient and Secure Delegation to a Single Malicious Server: Exponentiation over Non-abelian Groups.
Proceedings of the Mathematical Software - ICMS 2018, 2018

A Framework for Unconditionally Secure Public-Key Encryption (with Possible Decryption Errors).
Proceedings of the Mathematical Software - ICMS 2018, 2018

2017
Yao's Millionaires' Problem and Public-Key Encryption Without Computational Assumptions.
Int. J. Found. Comput. Sci., 2017

Probabilistic solution of Yao's millionaires' problem.
IACR Cryptol. ePrint Arch., 2017

Secure Multiparty Computation without One-way Functions.
FLAP, 2017

Computing multiple exponentiations in discrete log and RSA groups: From batch verification to batch delegation.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Practical and Secure Outsourcing of Discrete Log Group Exponentiation to a Single Malicious Server.
Proceedings of the 9th Cloud Computing Security Workshop, 2017

2016
Using semidirect product of (semi)groups in public key cryptography.
IACR Cryptol. ePrint Arch., 2016

Compositions of linear functions and applications to hashing.
Groups Complex. Cryptol., 2016

2015
Efficient and Secure Delegation of Group Exponentiation to a Single Server.
IACR Cryptol. ePrint Arch., 2015

2014
Yao's Millionaires' Problem and Decoy-Based Public Key Encryption by Classical Physics.
Int. J. Found. Comput. Sci., 2014

Navigating in the Cayley graph of SL<sub>2(F<sub>p)</sub></sub> and applications to hashing.
IACR Cryptol. ePrint Arch., 2014

Decoy-based information security.
Groups Complex. Cryptol., 2014

Editorial.
Groups Complex. Cryptol., 2014

A CCA secure cryptosystem using matrices over group rings.
CoRR, 2014

Navigating in the Cayley graph of SL<sub>2</sub>(F<sub>p</sub>) and applications to hashing.
CoRR, 2014

2013
Public key exchange using semidirect product of (semi)groups.
IACR Cryptol. ePrint Arch., 2013

Secure information transmission based on physical principles.
IACR Cryptol. ePrint Arch., 2013

Tropical cryptography.
IACR Cryptol. ePrint Arch., 2013

Public key exchange using matrices over group rings.
Groups Complex. Cryptol., 2013

Secrecy without one-way functions.
Groups Complex. Cryptol., 2013

2012
A Secret Sharing Scheme Based on Group Presentations and the Word Problem.
IACR Cryptol. ePrint Arch., 2012

No-leak authentication by the Sherlock Holmes method.
Groups Complex. Cryptol., 2012

2011
Generalized Learning Problems and Applications to Non-Commutative Cryptography.
IACR Cryptol. ePrint Arch., 2011

Sublinear time algorithms in the theory of groups and semigroups
CoRR, 2011

2010
Search and witness problems in group theory.
Groups Complex. Cryptol., 2010

Authentication schemes from actions on graphs, groups, or rings.
Ann. Pure Appl. Log., 2010

2009
Using Decision Problems in Public Key Cryptography.
Groups Complex. Cryptol., 2009

Authentication from Matrix Conjugation.
Groups Complex. Cryptol., 2009

2008
Public key encryption and encryption emulation attacks.
IACR Cryptol. ePrint Arch., 2008

Zero-knowledge authentication schemes from actions on graphs, groups, or rings
CoRR, 2008

Cryptanalysis of Stickel's Key Exchange Scheme.
Proceedings of the Computer Science, 2008

An Authentication Scheme Based on the Twisted Conjugacy Problem.
Proceedings of the Applied Cryptography and Network Security, 6th International Conference, 2008

2007
Recognizing and parametrizing curves isomorphic to a line.
J. Symb. Comput., 2007

2006
Combinatorial Group Theory and Public Key Cryptography.
Appl. Algebra Eng. Commun. Comput., 2006

The Conjugacy Search Problem in Public Key Cryptography: Unnecessary and Insufficient.
Appl. Algebra Eng. Commun. Comput., 2006

Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol.
Proceedings of the Public Key Cryptography, 2006

Hashing with Polynomials.
Proceedings of the Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30, 2006

2005
A new key exchange protocol based on the decomposition problem.
IACR Cryptol. ePrint Arch., 2005

A Practical Attack on a Braid Group Based Cryptographic Protocol.
Proceedings of the Advances in Cryptology, 2005

Thompson's Group and Public Key Cryptography.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
On Isomorphism of Lie Algebras with One Defining Relation.
Int. J. Algebra Comput., 2004

2003
Assessing security of some group based cryptosystems.
IACR Cryptol. ePrint Arch., 2003

Generic properties of Whitehead's Algorithm, stabilizers in Aut(F<sub>k</sub>) and one-relator groups
CoRR, 2003

2002
Average-case complexity and decision problems in group theory
CoRR, 2002

Generic-case complexity, decision problems in group theory and random walks
CoRR, 2002

2001
Representing Braids by Automorphisms.
Int. J. Algebra Comput., 2001

1996
Magnus Embeddings for Semigroups.
Int. J. Algebra Comput., 1996

1993
The Centre of a One-Relator Solvable Group.
Int. J. Algebra Comput., 1993

1991
Automorphisms of F/R′ Groups.
Int. J. Algebra Comput., 1991


  Loading...