Folgen
Arkady Yerukhimovich
Arkady Yerukhimovich
Bestätigte E-Mail-Adresse bei gwu.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Sok: Cryptographically protected database search
B Fuller, M Varia, A Yerukhimovich, E Shen, A Hamlin, V Gadepally, ...
2017 IEEE Symposium on Security and Privacy (SP), 172-191, 2017
1302017
Computing on masked data: a high performance method for improving big data veracity
J Kepner, V Gadepally, P Michaleas, N Schear, M Varia, A Yerukhimovich, ...
2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014
1022014
A survey of cryptographic approaches to securing big-data analytics in the cloud
S Yakoubov, V Gadepally, N Schear, E Shen, A Yerukhimovich
2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014
842014
POPE: Partial order preserving encoding
DS Roche, D Apon, SG Choi, A Yerukhimovich
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
832016
Limits on the power of zero-knowledge proofs in cryptographic constructions
Z Brakerski, J Katz, G Segev, A Yerukhimovich
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011
502011
Sok: Privacy on mobile devices–it’s complicated
C Spensky, J Stewart, A Yerukhimovich, R Shay, A Trachtenberg, ...
Proceedings on Privacy Enhancing Technologies 2016 (3), 96-116, 2016
492016
Blockchain technology: what is it good for?
S Ruoti, B Kaiser, A Yerukhimovich, J Clark, R Cunningham
Communications of the ACM 63 (1), 46-53, 2019
48*2019
Limits of computational differential privacy in the client/server setting
A Groce, J Katz, A Yerukhimovich
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011
302011
Computing on masked data to improve the security of big data
V Gadepally, B Hancock, B Kaiser, J Kepner, P Michaleas, M Varia, ...
2015 IEEE International Symposium on Technologies for Homeland Security (HST …, 2015
282015
Cryptography for Big Data Security.
A Hamlin, N Schear, E Shen, M Varia, S Yakoubov, A Yerukhimovich
IACR Cryptol. ePrint Arch. 2016, 12, 2016
262016
Differentially-private multi-party sketching for large-scale statistics
SG Choi, D Dachman-Soled, M Kulkarni, A Yerukhimovich
Proceedings on Privacy Enhancing Technologies 2020 (3), 153-174, 2020
242020
Impossibility of blind signatures from one-way permutations
J Katz, D Schröder, A Yerukhimovich
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011
232011
On black-box constructions of predicate encryption from trapdoor permutations
J Katz, A Yerukhimovich
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
232009
CompGC: Efficient offline/online semi-honest two-party computation
A Groce, A Ledger, AJ Malozemoff, A Yerukhimovich
Cryptology ePrint Archive, 2016
222016
Computational inexpensive PIR
W Gasarch, A Yerukhimovich
Draft available online at http://www. cs. umd. edu/arkady/pir/pirComp. pdf, 2006
16*2006
SoK: Blockchain technology and its potential use cases
S Ruoti, B Kaiser, A Yerukhimovich, J Clark, R Cunningham
arXiv preprint arXiv:1909.12454, 2019
142019
Stormy: Statistics in tor by measuring securely
R Wails, A Johnson, D Starin, A Yerukhimovich, SD Gordon
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
132019
(Efficient) universally composable oblivious transfer using a minimal number of stateless tokens
SG Choi, J Katz, D Schröder, A Yerukhimovich, HS Zhou
Theory of Cryptography: 11th Theory of Cryptography Conference, TCC 2014 …, 2014
132014
Authenticated broadcast with a partially compromised public-key infrastructure
SD Gordon, J Katz, R Kumaresan, A Yerukhimovich
Stabilization, Safety, and Security of Distributed Systems: 12th …, 2010
12*2010
The more the merrier: Reducing the cost of large scale MPC
SD Gordon, D Starin, A Yerukhimovich
Advances in Cryptology–EUROCRYPT 2021: 40th Annual International Conference …, 2021
112021
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20