Seguir
Arkady Yerukhimovich
Arkady Yerukhimovich
Dirección de correo verificada de gwu.edu - Página principal
Título
Citado por
Citado por
Año
Sok: Cryptographically protected database search
B Fuller, M Varia, A Yerukhimovich, E Shen, A Hamlin, V Gadepally, ...
2017 IEEE Symposium on Security and Privacy (SP), 172-191, 2017
1552017
Computing on masked data: a high performance method for improving big data veracity
J Kepner, V Gadepally, P Michaleas, N Schear, M Varia, A Yerukhimovich, ...
2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014
1132014
POPE: Partial order preserving encoding
DS Roche, D Apon, SG Choi, A Yerukhimovich
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
952016
A survey of cryptographic approaches to securing big-data analytics in the cloud
S Yakoubov, V Gadepally, N Schear, E Shen, A Yerukhimovich
2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014
902014
Blockchain technology: what is it good for?
S Ruoti, B Kaiser, A Yerukhimovich, J Clark, R Cunningham
Communications of the ACM 63 (1), 46-53, 2019
68*2019
Limits on the power of zero-knowledge proofs in cryptographic constructions
Z Brakerski, J Katz, G Segev, A Yerukhimovich
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011
542011
Sok: Privacy on mobile devices–it’s complicated
C Spensky, J Stewart, A Yerukhimovich, R Shay, A Trachtenberg, ...
Proceedings on Privacy Enhancing Technologies, 2016
532016
Differentially-private multi-party sketching for large-scale statistics
SG Choi, D Dachman-Soled, M Kulkarni, A Yerukhimovich
Proceedings on Privacy Enhancing Technologies, 2020
432020
Cryptography for Big Data Security.
A Hamlin, N Schear, E Shen, M Varia, S Yakoubov, A Yerukhimovich
IACR Cryptol. ePrint Arch. 2016, 12, 2016
352016
Limits of computational differential privacy in the client/server setting
A Groce, J Katz, A Yerukhimovich
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011
342011
Computing on masked data to improve the security of big data
V Gadepally, B Hancock, B Kaiser, J Kepner, P Michaleas, M Varia, ...
2015 IEEE International Symposium on Technologies for Homeland Security (HST …, 2015
302015
When frodo flips: End-to-end key recovery on frodokem via rowhammer
M Fahr Jr, H Kippen, A Kwong, T Dang, J Lichtinger, D Dachman-Soled, ...
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
272022
Impossibility of blind signatures from one-way permutations
J Katz, D Schröder, A Yerukhimovich
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011
262011
On black-box constructions of predicate encryption from trapdoor permutations
J Katz, A Yerukhimovich
International Conference on the Theory and Application of Cryptology and …, 2009
242009
Compressed oblivious encoding for homomorphically encrypted search
SG Choi, D Dachman-Soled, SD Gordon, L Liu, A Yerukhimovich
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
222021
Compgc: Efficient offline/online semi-honest two-party computation
A Groce, A Ledger, AJ Malozemoff, A Yerukhimovich
Cryptology ePrint Archive, 2016
212016
SoK: Blockchain technology and its potential use cases
S Ruoti, B Kaiser, A Yerukhimovich, J Clark, R Cunningham
arXiv preprint arXiv:1909.12454, 2019
192019
The more the merrier: reducing the cost of large scale MPC
SD Gordon, D Starin, A Yerukhimovich
Annual International Conference on the Theory and Applications of …, 2021
172021
Fighting fake news in encrypted messaging with the fuzzy anonymous complaint tally system (facts)
L Liu, DS Roche, A Theriault, A Yerukhimovich
arXiv preprint arXiv:2109.04559, 2021
162021
Stormy: Statistics in tor by measuring securely
R Wails, A Johnson, D Starin, A Yerukhimovich, SD Gordon
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
162019
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20