Yuriy Polyakov

Orcid: 0000-0002-5566-3763

Affiliations:
  • NJIT Cybersecurity Research Center, Newark, NJ, USA


According to our database1, Yuriy Polyakov authored at least 35 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FHERMA: Building the Open-Source FHE Components Library for Practical Use.
IACR Cryptol. ePrint Arch., 2024

Application-Aware Approximate Homomorphic Encryption: Configuring FHE for Practical Use.
IACR Cryptol. ePrint Arch., 2024

2023
RPU: The Ring Processing Unit.
IACR Cryptol. ePrint Arch., 2023

Collaborative Privacy-Preserving Analysis of Oncological Data using Multiparty Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023

TREBUCHET: Fully Homomorphic Encryption Accelerator for Deep Computation.
IACR Cryptol. ePrint Arch., 2023

Demystifying Bootstrapping in Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2023

2022
OpenFHE: Open-Source Fully Homomorphic Encryption Library.
IACR Cryptol. ePrint Arch., 2022

2021
Implementation and Performance Evaluation of RNS Variants of the BFV Homomorphic Encryption Scheme.
IEEE Trans. Emerg. Top. Comput., 2021

Large-Precision Homomorphic Sign Evaluation using FHEW/TFHE Bootstrapping.
IACR Cryptol. ePrint Arch., 2021

Revisiting Homomorphic Encryption Schemes for Finite Fields.
IACR Cryptol. ePrint Arch., 2021

Encrypted-Input Obfuscation of Image Classifiers.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

2020
Bootstrapping in FHEW-like Cryptosystems.
IACR Cryptol. ePrint Arch., 2020

Approximate Homomorphic Encryption with Reduced Approximation Error.
IACR Cryptol. ePrint Arch., 2020

Secure large-scale genome-wide association studies using homomorphic encryption.
IACR Cryptol. ePrint Arch., 2020

Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input Obfuscation.
Proceedings of the CCSW'20, 2020

2019
Practical Applications of Improved Gaussian Sampling for Trapdoor Lattices.
IEEE Trans. Computers, 2019

Optimized Homomorphic Encryption Solution for Secure Genome-Wide Association Studies.
IACR Cryptol. ePrint Arch., 2019

RAMPARTS: A Programmer-Friendly System for Building Homomorphic Encryption Applications.
IACR Cryptol. ePrint Arch., 2019

2018
Implementation and Evaluation of a Lattice-Based Key-Policy ABE Scheme.
IEEE Trans. Inf. Forensics Secur., 2018

An Improved RNS Variant of the BFV Homomorphic Encryption Scheme.
IACR Cryptol. ePrint Arch., 2018

Building an Efficient Lattice Gadget Toolkit: Subgaussian Sampling and More.
IACR Cryptol. ePrint Arch., 2018

Implementing Token-Based Obfuscation under (Ring) LWE.
IACR Cryptol. ePrint Arch., 2018

Intrusion-Resilient Classifier Approximation: From Wildcard Matching to Range Membership.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Building Applications with Homomorphic Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Fast Proxy Re-Encryption for Publish/Subscribe Systems.
ACM Trans. Priv. Secur., 2017

Implementation and Evaluation of Improved Gaussian Sampling for Lattice Trapdoors.
IACR Cryptol. ePrint Arch., 2017

Implementing Conjunction Obfuscation under Entropic Ring LWE.
IACR Cryptol. ePrint Arch., 2017

PICADOR: End-to-end encrypted Publish-Subscribe information distribution with proxy re-encryption.
Future Gener. Comput. Syst., 2017

Practical Implementation of Lattice-Based Program Obfuscators for Point Functions.
Proceedings of the 2017 International Conference on High Performance Computing & Simulation, 2017

2016
Secure access delegation of encrypted medical information.
Proceedings of the 10th International Symposium on Medical Information and Communication Technology, 2016

Practical implementations of program obfuscators for point functions.
Proceedings of the International Conference on High Performance Computing & Simulation, 2016

Securely Sharing Encrypted Medical Information.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016

2015
Identifying Pairs of Terms with Strong Semantic Connections in a Textbook Index.
Proceedings of the KEOD 2015, 2015

An end-to-end security architecture to collect, process and share wearable medical device data.
Proceedings of the 17th International Conference on E-health Networking, 2015

2008
Analysis of Discrete Signals with Stochastic Components Using flicker Noise Spectroscopy.
Int. J. Bifurc. Chaos, 2008


  Loading...