Yuriy Polyakov

Orcid: 0000-0002-5566-3763

Affiliations:
  • NJIT Cybersecurity Research Center, Newark, NJ, USA


According to our database1, Yuriy Polyakov authored at least 43 papers between 2008 and 2026.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2026
Secure numerical simulations using fully homomorphic encryption.
Comput. Phys. Commun., 2026

2025
Evaluating Larger Lookup Tables using CKKS.
IACR Cryptol. ePrint Arch., 2025

FHERMA Cookbook: FHE Components for Privacy-Preserving Applications.
IACR Cryptol. ePrint Arch., 2025

HRA-Secure Homomorphic Lattice-Based Proxy Re-Encryption with Tight Security.
IACR Commun. Cryptol., 2025

Encrypt What Matters: Selective Model Encryption for More Efficient Secure Federated Learning.
Proceedings of the Data and Applications Security and Privacy XXXIX, 2025

General Functional Bootstrapping Using CKKS.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
FHERMA: Building the Open-Source FHE Components Library for Practical Use.
IACR Cryptol. ePrint Arch., 2024

Application-Aware Approximate Homomorphic Encryption: Configuring FHE for Practical Use.
IACR Cryptol. ePrint Arch., 2024

Investigating Privacy Attacks in the Gray-Box Setting to Enhance Collaborative Learning Schemes.
CoRR, 2024

Security Guidelines for Implementing Homomorphic Encryption.
IACR Commun. Cryptol., 2024

2023
Collaborative Privacy-Preserving Analysis of Oncological Data using Multiparty Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023

TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation.
IACR Cryptol. ePrint Arch., 2023

Demystifying Bootstrapping in Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023


2022
Approximate Homomorphic Encryption with Reduced Approximation Error.
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022


Large-Precision Homomorphic Sign Evaluation Using FHEW/TFHE Bootstrapping.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme.
IEEE Trans. Emerg. Top. Comput., 2021

Encrypted-Input Obfuscation of Image Classifiers.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

Bootstrapping in FHEW-like Cryptosystems.
Proceedings of the WAHC '21: Proceedings of the 9th on Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2021

Revisiting Homomorphic Encryption Schemes for Finite Fields.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Secure large-scale genome-wide association studies using homomorphic encryption.
IACR Cryptol. ePrint Arch., 2020

Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input Obfuscation.
Proceedings of the CCSW'20, 2020

2019
Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices.
IEEE Trans. Computers, 2019

Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies.
IACR Cryptol. ePrint Arch., 2019

Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling and More.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

An Improved RNS Variant of the BFV Homomorphic Encryption Scheme.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications.
Proceedings of the 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2019

2018
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme.
IEEE Trans. Inf. Forensics Secur., 2018

Implementing Token-Based Obfuscation under (Ring) LWE.
IACR Cryptol. ePrint Arch., 2018

Intrusion-Resilient Classifier Approximation: From Wildcard Matching to Range Membership.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Implementing Conjunction Obfuscation Under Entropic Ring LWE.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Building Applications with Homomorphic Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors.
Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2018

2017
Fast Proxy Re-Encryption for Publish/Subscribe Systems.
ACM Trans. Priv. Secur., 2017

PICADOR: End-to-end encrypted Publish-Subscribe information distribution with proxy re-encryption.
Future Gener. Comput. Syst., 2017

Practical Implementation of Lattice-Based Program Obfuscators for Point Functions.
Proceedings of the 2017 International Conference on High Performance Computing & Simulation, 2017

2016
Secure access delegation of encrypted medical information.
Proceedings of the 10th International Symposium on Medical Information and Communication Technology, 2016

Practical implementations of program obfuscators for point functions.
Proceedings of the International Conference on High Performance Computing & Simulation, 2016

Securely Sharing Encrypted Medical Information.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016

2015
Identifying Pairs of Terms with Strong Semantic Connections in a Textbook Index.
Proceedings of the KEOD 2015, 2015

An end-to-end security architecture to collect, process and share wearable medical device data.
Proceedings of the 17th International Conference on E-health Networking, 2015

2008
Analysis of Discrete Signals with Stochastic Components Using flicker Noise Spectroscopy.
Int. J. Bifurc. Chaos, 2008


  Loading...