Yevgeniy Vahlis

According to our database1, Yevgeniy Vahlis authored at least 16 papers between 2008 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2018
Boosting Model Performance through Differentially Private Model Aggregation.
CoRR, 2018

2014
Efficient Network-Based Enforcement of Data Access Rights.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

Is it really you?: user identification via adaptive behavior fingerprinting.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
EyeDecrypt - Private Interactions in Plain Sight.
IACR Cryptol. ePrint Arch., 2013

Secure Key Exchange and Sessions Without Credentials.
IACR Cryptol. ePrint Arch., 2013

2012
How powerful are the DDH hard groups?
Electron. Colloquium Comput. Complex., 2012

Multi-location Leakage Resilient Cryptography.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Secure two-party computation in sublinear (amortized) time.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Cryptography: Leakage Resilience, Black Box Separations, and Credential-free Key Exchange.
PhD thesis, 2011

Secure Computation with Sublinear Amortized Work.
IACR Cryptol. ePrint Arch., 2011

Verifiable Delegation of Computation over Large Datasets.
IACR Cryptol. ePrint Arch., 2011

2010
Signatures Resilient to Continual Leakage on Memory and Computation.
IACR Cryptol. ePrint Arch., 2010

On Protecting Cryptographic Keys Against Continual Leakage.
IACR Cryptol. ePrint Arch., 2010

Two Is a Crowd? A Black-Box Separation of One-Wayness and Security under Correlated Inputs.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

2008
CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2008

On the Impossibility of Basing Identity Based Encryption on Trapdoor Permutations.
Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science, 2008


  Loading...