What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Arkady Yerukhimovich
Google Scholar
ORCID:
0000-0002-9045-748X
22
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
Non-Interactive Verifiable Aggregation.
Ojaswi Acharya
Suvasree Biswas
Weiqi Feng
Adam O'Neill
Arkady Yerukhimovich
2025
conf/sp
PQ-Hammer: End-to-End Key Recovery Attacks on Post-Quantum Cryptography Using Rowhammer.
Samy Amer
Yingchen Wang
Hunter Kippen
Thinh Dang
Daniel Genkin
Andrew Kwong
Alexander Nelson
Arkady Yerukhimovich
2024
journals/cic
On the Privacy of Sublinear-Communication Jaccard Index Estimation via Min-hash.
Mingyu Liang
Seung Geol Choi
Dana Dachman-Soled
Linsheng Liu
Arkady Yerukhimovich
2022
conf/ccs
When Frodo Flips: End-to-End Key Recovery on FrodoKEM via Rowhammer.
Michael Fahr
Hunter Kippen
Andrew Kwong
Thinh Dang
Jacob Lichtinger
Dana Dachman-Soled
Daniel Genkin
Alexander Nelson
Ray A. Perlner
Arkady Yerukhimovich
Daniel Apon
2022
conf/ndss
Fighting Fake News in Encrypted Messaging with the Fuzzy Anonymous Complaint Tally System (FACTS).
Linsheng Liu
Daniel S. Roche
Austin Theriault
Arkady Yerukhimovich
2022
conf/tcc
Secure Sampling with Sublinear Communication.
Seung Geol Choi
Dana Dachman-Soled
S. Dov Gordon
Linsheng Liu
Arkady Yerukhimovich
2021
conf/ccs
Compressed Oblivious Encoding for Homomorphically Encrypted Search.
Seung Geol Choi
Dana Dachman-Soled
S. Dov Gordon
Linsheng Liu
Arkady Yerukhimovich
2021
conf/eurocrypt
The More the Merrier: Reducing the Cost of Large Scale MPC.
S. Dov Gordon
Daniel Starin
Arkady Yerukhimovich
2020
journals/popets
Differentially-Private Multi-Party Sketching for Large-Scale Statistics.
Seung Geol Choi
Dana Dachman-Soled
Mukul Kulkarni
Arkady Yerukhimovich
2019
journals/joc
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
Seung Geol Choi
Jonathan Katz
Dominique Schröder
Arkady Yerukhimovich
Hong-Sheng Zhou
2019
conf/ccs
Stormy: Statistics in Tor by Measuring Securely.
Ryan Wails
Aaron Johnson
Daniel Starin
Arkady Yerukhimovich
S. Dov Gordon
2019
conf/cns
Location Leakage from Network Access Patterns.
Trishita Tiwari
Avraham Klausner
Mikhail Andreev
Ari Trachtenberg
Arkady Yerukhimovich
2017
conf/sp
SoK: Cryptographically Protected Database Search.
Benjamin Fuller
Mayank Varia
Arkady Yerukhimovich
Emily Shen
Ariel Hamlin
Vijay Gadepally
Richard Shay
John Darby Mitchell
Robert K. Cunningham
2017
conf/pkc
Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions.
Gene Itkis
Emily Shen
Mayank Varia
David Wilson
Arkady Yerukhimovich
2016
journals/popets
SoK: Privacy on Mobile Devices - It's Complicated.
Chad Spensky
Jeffrey Stewart
Arkady Yerukhimovich
Richard Shay
Ari Trachtenberg
Rick Housley
Robert K. Cunningham
2016
conf/ccs
POPE: Partial Order Preserving Encoding.
Daniel S. Roche
Daniel Apon
Seung Geol Choi
Arkady Yerukhimovich
2014
conf/tcc
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens.
Seung Geol Choi
Jonathan Katz
Dominique Schröder
Arkady Yerukhimovich
Hong-Sheng Zhou
2011
conf/tcc
Limits of Computational Differential Privacy in the Client/Server Setting.
Adam Groce
Jonathan Katz
Arkady Yerukhimovich
2011
conf/tcc
Impossibility of Blind Signatures from One-Way Permutations.
Jonathan Katz
Dominique Schröder
Arkady Yerukhimovich
2011
conf/tcc
Limits on the Power of Zero-Knowledge Proofs in Cryptographic Constructions.
Zvika Brakerski
Jonathan Katz
Gil Segev
Arkady Yerukhimovich
2010
conf/latincrypt
On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations.
S. Dov Gordon
Hoeteck Wee
David Xiao
Arkady Yerukhimovich
2009
conf/asiacrypt
On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations.
Jonathan Katz
Arkady Yerukhimovich
Coauthors
Aaron Johnson
(1)
Adam Groce
(1)
Adam O'Neill
(1)
Alexander Nelson
(2)
Andrew Kwong
(2)
Ari Trachtenberg
(2)
Ariel Hamlin
(1)
Arkady Yerukhimovich
(22)
Austin Theriault
(1)
Avraham Klausner
(1)
Benjamin Fuller
(1)
Chad Spensky
(1)
Dana Dachman-Soled
(5)
Daniel Apon
(2)
Daniel Genkin
(2)
Daniel S. Roche
(2)
Daniel Starin
(2)
David Wilson
(1)
David Xiao
(1)
Dominique Schröder
(3)
Emily Shen
(2)
Gene Itkis
(1)
Gil Segev
(1)
Hoeteck Wee
(1)
Hong-Sheng Zhou
(2)
Hunter Kippen
(2)
Jacob Lichtinger
(1)
Jeffrey Stewart
(1)
John Darby Mitchell
(1)
Jonathan Katz
(6)
Linsheng Liu
(4)
Mayank Varia
(2)
Michael Fahr
(1)
Mikhail Andreev
(1)
Mingyu Liang
(1)
Mukul Kulkarni
(1)
Ojaswi Acharya
(1)
Ray A. Perlner
(1)
Richard Shay
(2)
Rick Housley
(1)
Robert K. Cunningham
(2)
Ryan Wails
(1)
S. Dov Gordon
(5)
Samy Amer
(1)
Seung Geol Choi
(7)
Suvasree Biswas
(1)
Thinh Dang
(2)
Trishita Tiwari
(1)
Vijay Gadepally
(1)
Weiqi Feng
(1)
Yingchen Wang
(1)
Zvika Brakerski
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to