default search action
Arkady Yerukhimovich
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Chunchi Liu, Minghui Xu, Hechuan Guo, Xiuzhen Cheng, Yinhao Xiao, Dongxiao Yu, Bei Gong, Arkady Yerukhimovich, Shengling Wang, Weifeng Lyu:
TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things. IEEE Trans. Mob. Comput. 23(5): 6133-6148 (2024) - [i23]Suvasree Biswas, Arkady Yerukhimovich:
Multi-Key Fully-Homomorphic Aggregate MAC for Arithmetic Circuits. IACR Cryptol. ePrint Arch. 2024: 1499 (2024) - 2023
- [i22]Seung Geol Choi, Dana Dachman-Soled, Mingyu Liang, Linsheng Liu, Arkady Yerukhimovich:
On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash Sketching. IACR Cryptol. ePrint Arch. 2023: 1523 (2023) - 2022
- [c21]Michael Fahr, Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray A. Perlner, Arkady Yerukhimovich, Daniel Apon:
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer. CCS 2022: 979-993 - [c20]Linsheng Liu, Daniel S. Roche, Austin Theriault, Arkady Yerukhimovich:
Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS). NDSS 2022 - [c19]Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich:
Secure Sampling with Sublinear Communication. TCC (2) 2022: 348-377 - [i21]Dana Dachman-Soled, Seung Geol Choi, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich:
Secure Sampling with Sublinear Communication. IACR Cryptol. ePrint Arch. 2022: 660 (2022) - [i20]Michael Fahr, Hunter Kippen, Andrew Kwong, Thinh Dang, Jacob Lichtinger, Dana Dachman-Soled, Daniel Genkin, Alexander Nelson, Ray A. Perlner, Arkady Yerukhimovich, Daniel Apon:
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer. IACR Cryptol. ePrint Arch. 2022: 952 (2022) - 2021
- [c18]Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich:
Compressed Oblivious Encoding for Homomorphically Encrypted Search. CCS 2021: 2277-2291 - [c17]S. Dov Gordon, Daniel Starin, Arkady Yerukhimovich:
The More the Merrier: Reducing the Cost of Large Scale MPC. EUROCRYPT (2) 2021: 694-723 - [i19]Linsheng Liu, Daniel S. Roche, Austin Theriault, Arkady Yerukhimovich:
Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS). CoRR abs/2109.04559 (2021) - [i18]Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich:
Compressed Oblivious Encoding for Homomorphically Encrypted Search. CoRR abs/2109.07708 (2021) - [i17]S. Dov Gordon, Daniel Starin, Arkady Yerukhimovich:
The More The Merrier: Reducing the Cost of Large Scale MPC. IACR Cryptol. ePrint Arch. 2021: 303 (2021) - [i16]Linsheng Liu, Daniel S. Roche, Austin Theriault, Arkady Yerukhimovich:
Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS). IACR Cryptol. ePrint Arch. 2021: 1148 (2021) - [i15]Seung Geol Choi, Dana Dachman-Soled, S. Dov Gordon, Linsheng Liu, Arkady Yerukhimovich:
Compressed Oblivious Encoding for Homomorphically Encrypted Search. IACR Cryptol. ePrint Arch. 2021: 1199 (2021) - 2020
- [j7]Scott Ruoti, Ben Kaiser, Arkady Yerukhimovich, Jeremy Clark, Robert K. Cunningham:
Blockchain technology: what is it good for? Commun. ACM 63(1): 46-53 (2020) - [j6]Seung Geol Choi, Dana Dachman-Soled, Mukul Kulkarni, Arkady Yerukhimovich:
Differentially-Private Multi-Party Sketching for Large-Scale Statistics. Proc. Priv. Enhancing Technol. 2020(3): 153-174 (2020) - [i14]Chun-Chi Liu, Minghui Xu, Hechuan Guo, Xiuzhen Cheng, Yinhao Xiao, Dongxiao Yu, Bei Gong, Arkady Yerukhimovich, Shengling Wang, Weifeng Lv:
Tokoin: A Coin-Based Accountable Access Control Scheme for Internet of Things. CoRR abs/2011.04919 (2020) - [i13]Seung Geol Choi, Dana Dachman-Soled, Mukul Kulkarni, Arkady Yerukhimovich:
Differentially-Private Multi-Party Sketching for Large-Scale Statistics. IACR Cryptol. ePrint Arch. 2020: 29 (2020)
2010 – 2019
- 2019
- [j5]Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou:
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens. J. Cryptol. 32(2): 459-497 (2019) - [j4]Scott Ruoti, Ben Kaiser, Arkady Yerukhimovich, Jeremy Clark, Robert K. Cunningham:
Blockchain Technology: What Is It Good for? ACM Queue 17(5): 41-68 (2019) - [c16]Ryan Wails, Aaron Johnson, Daniel Starin, Arkady Yerukhimovich, S. Dov Gordon:
Stormy: Statistics in Tor by Measuring Securely. CCS 2019: 615-632 - [c15]Trishita Tiwari, Avraham Klausner, Mikhail Andreev, Ari Trachtenberg, Arkady Yerukhimovich:
Location Leakage from Network Access Patterns. CNS 2019: 214-222 - [i12]Scott Ruoti, Benjamin Kaiser, Arkady Yerukhimovich, Jeremy Clark, Robert K. Cunningham:
SoK: Blockchain Technology and Its Potential Use Cases. CoRR abs/1909.12454 (2019) - 2018
- [i11]Mikhail Andreev, Avi Klausner, Trishita Tiwari, Ari Trachtenberg, Arkady Yerukhimovich:
Nothing But Net: Invading Android User Privacy Using Only Network Access Patterns. CoRR abs/1807.02719 (2018) - 2017
- [c14]Gene Itkis, Emily Shen, Mayank Varia, David Wilson, Arkady Yerukhimovich:
Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions. Public Key Cryptography (2) 2017: 67-87 - [c13]Benjamin Fuller, Mayank Varia, Arkady Yerukhimovich, Emily Shen, Ariel Hamlin, Vijay Gadepally, Richard Shay, John Darby Mitchell, Robert K. Cunningham:
SoK: Cryptographically Protected Database Search. IEEE Symposium on Security and Privacy 2017: 172-191 - [i10]Benjamin Fuller, Mayank Varia, Arkady Yerukhimovich, Emily Shen, Ariel Hamlin, Vijay Gadepally, Richard Shay, John Darby Mitchell, Robert K. Cunningham:
SoK: Cryptographically Protected Database Search. CoRR abs/1703.02014 (2017) - [i9]Gene Itkis, Emily Shen, Mayank Varia, David Wilson, Arkady Yerukhimovich:
Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions. IACR Cryptol. ePrint Arch. 2017: 29 (2017) - 2016
- [j3]Chad Spensky, Jeffrey Stewart, Arkady Yerukhimovich, Richard Shay, Ari Trachtenberg, Rick Housley, Robert K. Cunningham:
SoK: Privacy on Mobile Devices - It's Complicated. Proc. Priv. Enhancing Technol. 2016(3): 96-116 (2016) - [c12]Daniel S. Roche, Daniel Apon, Seung Geol Choi, Arkady Yerukhimovich:
POPE: Partial Order Preserving Encoding. CCS 2016: 1131-1142 - [c11]Kyle Hogan, Noah Luther, Nabil Schear, Emily Shen, David Stott, Sophia Yakoubov, Arkady Yerukhimovich:
Secure Multiparty Computation for Cooperative Cyber Risk Assessment. SecDev 2016: 75-76 - [i8]Daniel S. Roche, Daniel Apon, Seung Geol Choi, Arkady Yerukhimovich:
POPE: Partial Order Preserving Encoding. CoRR abs/1610.04025 (2016) - [i7]Ariel Hamlin, Nabil Schear, Emily Shen, Mayank Varia, Sophia Yakoubov, Arkady Yerukhimovich:
Cryptography for Big Data Security. IACR Cryptol. ePrint Arch. 2016: 12 (2016) - [i6]Adam Groce, Alex Ledger, Alex J. Malozemoff, Arkady Yerukhimovich:
CompGC: Efficient Offline/Online Semi-honest Two-party Computation. IACR Cryptol. ePrint Arch. 2016: 458 (2016) - 2015
- [i5]Vijay Gadepally, Braden Hancock, Benjamin Kaiser, Jeremy Kepner, Peter Michaleas, Mayank Varia, Arkady Yerukhimovich:
Computing on Masked Data to improve the Security of Big Data. CoRR abs/1504.01287 (2015) - [i4]Daniel S. Roche, Daniel Apon, Seung Geol Choi, Arkady Yerukhimovich:
POPE: Partial Order-Preserving Encoding. IACR Cryptol. ePrint Arch. 2015: 1106 (2015) - 2014
- [j2]S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Arkady Yerukhimovich:
Authenticated broadcast with a partially compromised public-key infrastructure. Inf. Comput. 234: 17-25 (2014) - [c10]Jeremy Kepner, Vijay Gadepally, Peter Michaleas, Nabil Schear, Mayank Varia, Arkady Yerukhimovich, Robert K. Cunningham:
Computing on masked data: a high performance method for improving big data veracity. HPEC 2014: 1-6 - [c9]Sophia Yakoubov, Vijay Gadepally, Nabil Schear, Emily Shen, Arkady Yerukhimovich:
A survey of cryptographic approaches to securing big-data analytics in the cloud. HPEC 2014: 1-6 - [c8]Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou:
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens. TCC 2014: 638-662 - [i3]Jeremy Kepner, Vijay Gadepally, Peter Michaleas, Nabil Schear, Mayank Varia, Arkady Yerukhimovich, Robert K. Cunningham:
Computing on Masked Data: a High Performance Method for Improving Big Data Veracity. CoRR abs/1406.5751 (2014) - 2013
- [i2]Seung Geol Choi, Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich, Hong-Sheng Zhou:
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens. IACR Cryptol. ePrint Arch. 2013: 840 (2013) - 2011
- [c7]Adam Groce, Jonathan Katz, Arkady Yerukhimovich:
Limits of Computational Differential Privacy in the Client/Server Setting. TCC 2011: 417-431 - [c6]Zvika Brakerski, Jonathan Katz, Gil Segev, Arkady Yerukhimovich:
Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions. TCC 2011: 559-578 - [c5]Jonathan Katz, Dominique Schröder, Arkady Yerukhimovich:
Impossibility of Blind Signatures from One-Way Permutations. TCC 2011: 615-629 - 2010
- [c4]S. Dov Gordon, Hoeteck Wee, David Xiao, Arkady Yerukhimovich:
On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations. LATINCRYPT 2010: 189-204 - [c3]S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Arkady Yerukhimovich:
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure. SSS 2010: 144-158
2000 – 2009
- 2009
- [c2]Jonathan Katz, Arkady Yerukhimovich:
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations. ASIACRYPT 2009: 197-213 - [i1]S. Dov Gordon, Jonathan Katz, Ranjit Kumaresan, Arkady Yerukhimovich:
Authenticated Broadcast with a Partially Compromised Public-Key Infrastructure. IACR Cryptol. ePrint Arch. 2009: 410 (2009) - 2006
- [c1]Arkady Yerukhimovich, Ramani Duraiswami, Nail A. Gumerov, Dmitry N. Zotkin:
Frequency Independent Flexible Spherical Beamforming Via Rbf Fitting. ICASSP (5) 2006: 45-48 - 2005
- [j1]Lee-Ad Gottlieb, John E. Savage, Arkady Yerukhimovich:
Efficient Data Storage in Large Nanoarrays. Theory Comput. Syst. 38(4): 503-536 (2005)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint