Arkady Yerukhimovich
Arkady Yerukhimovich
Verified email at - Homepage
Cited by
Cited by
Sok: Cryptographically protected database search
B Fuller, M Varia, A Yerukhimovich, E Shen, A Hamlin, V Gadepally, ...
2017 IEEE Symposium on Security and Privacy (SP), 172-191, 2017
Computing on masked data: a high performance method for improving big data veracity
J Kepner, V Gadepally, P Michaleas, N Schear, M Varia, A Yerukhimovich, ...
2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014
POPE: Partial order preserving encoding
DS Roche, D Apon, SG Choi, A Yerukhimovich
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
A survey of cryptographic approaches to securing big-data analytics in the cloud
S Yakoubov, V Gadepally, N Schear, E Shen, A Yerukhimovich
2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014
Limits on the power of zero-knowledge proofs in cryptographic constructions
Z Brakerski, J Katz, G Segev, A Yerukhimovich
Theory of Cryptography Conference, 559-578, 2011
Sok: Privacy on mobile devices–it’s complicated
C Spensky, J Stewart, A Yerukhimovich, R Shay, A Trachtenberg, ...
Proceedings on Privacy Enhancing Technologies 2016 (3), 96-116, 2016
Limits of computational differential privacy in the client/server setting
A Groce, J Katz, A Yerukhimovich
Theory of Cryptography Conference, 417-431, 2011
Computing on masked data to improve the security of big data
V Gadepally, B Hancock, B Kaiser, J Kepner, P Michaleas, M Varia, ...
2015 IEEE International Symposium on Technologies for Homeland Security (HST …, 2015
Cryptography for big data security
A Hamlin, N Schear, E Shen, M Varia, S Yakoubov, A Yerukhimovich
Big data: storage, sharing, and security, 241-288, 2016
Impossibility of blind signatures from one-way permutations
J Katz, D Schröder, A Yerukhimovich
Theory of Cryptography Conference, 615-629, 2011
CompGC: Efficient Offline/Online Semi-honest Two-party Computation.
A Groce, A Ledger, AJ Malozemoff, A Yerukhimovich
IACR Cryptol. ePrint Arch. 2016, 458, 2016
On black-box constructions of predicate encryption from trapdoor permutations
J Katz, A Yerukhimovich
International Conference on the Theory and Application of Cryptology and …, 2009
Computational inexpensive PIR, 2006
W Gasarch, A Yerukhimovich
Draft available online at http://www. cs. umd. edu/∼ arkady/pir/pirComp. pdf, 0
Blockchain technology: what is it good for?
S Ruoti, B Kaiser, A Yerukhimovich, J Clark, R Cunningham
Communications of the ACM 63 (1), 46-53, 2019
Authenticated broadcast with a partially compromised public-key infrastructure
SD Gordon, J Katz, R Kumaresan, A Yerukhimovich
Symposium on Self-Stabilizing Systems, 144-158, 2010
Efficient data storage in large nanoarrays
LAJ Gottlieb, JE Savage, A Yerukhimovich
Theory of Computing Systems 38 (4), 503-536, 2005
On the round complexity of zero-knowledge proofs based on one-way permutations
SD Gordon, H Wee, D Xiao, A Yerukhimovich
International Conference on Cryptology and Information Security in Latin …, 2010
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens
SG Choi, J Katz, D Schröder, A Yerukhimovich, HS Zhou
Theory of Cryptography Conference, 638-662, 2014
Bounded-collusion attribute-based encryption from minimal assumptions
G Itkis, E Shen, M Varia, D Wilson, A Yerukhimovich
IACR International Workshop on Public Key Cryptography, 67-87, 2017
A study of separation in cryptography: New results and new models, 2011
A Yerukhimovich
PhD thesis, the University of Maryland. Available at http://www. cs. umd …, 0
The system can't perform the operation now. Try again later.
Articles 1–20