What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ilya Mironov
Google Scholar
ORCID:
0000-0002-2149-1916
26
publications in security and cryptology related venues
Year
Venue
Title
2020
conf/crypto
Cryptanalytic Extraction of Neural Network Models.
Nicholas Carlini
Matthew Jagielski
Ilya Mironov
2018
journals/joc
Incremental Deterministic Public-Key Encryption.
Ilya Mironov
Omkant Pandey
Omer Reingold
Gil Segev
2017
conf/tcc
Strengthening the Security of Encrypted Databases: Non-transitive JOINs.
Ilya Mironov
Gil Segev
Ido Shahaf
2016
conf/ccs
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE.
Joppe W. Bos
Craig Costello
Léo Ducas
Ilya Mironov
Michael Naehrig
Valeria Nikolaenko
Ananth Raghunathan
Douglas Stebila
2016
conf/ccs
Deep Learning with Differential Privacy.
Martín Abadi
Andy Chu
Ian J. Goodfellow
H. Brendan McMahan
Ilya Mironov
Kunal Talwar
Li Zhang
2016
conf/crypto
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines.
Yevgeniy Dodis
Ilya Mironov
Noah Stephens-Davidowitz
2015
conf/eurocrypt
Cryptographic Reverse Firewalls.
Ilya Mironov
Noah Stephens-Davidowitz
2015
conf/eurocrypt
Hosting Services on an Untrusted Cloud.
Dan Boneh
Divya Gupta
Ilya Mironov
Amit Sahai
2014
conf/ndss
Web PKI: Closing the Gap between Guidelines and Practices.
Antoine Delignat-Lavaud
Martín Abadi
Andrew Birrell
Ilya Mironov
Ted Wobber
Yinglian Xie
2013
conf/crypto
Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols.
Vipul Goyal
Ilya Mironov
Omkant Pandey
Amit Sahai
2013
conf/crypto
Message-Locked Encryption for Lock-Dependent Messages.
Martín Abadi
Dan Boneh
Ilya Mironov
Ananth Raghunathan
Gil Segev
2012
conf/ccs
On significance of the least significant bits for differential privacy.
Ilya Mironov
2012
conf/crypto
Differential Privacy with Imperfect Randomness.
Yevgeniy Dodis
Adriana López-Alt
Ilya Mironov
Salil P. Vadhan
2012
conf/eurocrypt
Incremental Deterministic Public-Key Encryption.
Ilya Mironov
Omkant Pandey
Omer Reingold
Gil Segev
2010
conf/fse
Domain Extension for Enhanced Target Collision-Resistant Hash Functions.
Ilya Mironov
2009
conf/crypto
Computational Differential Privacy.
Ilya Mironov
Omkant Pandey
Omer Reingold
Salil P. Vadhan
2007
conf/ctrsa
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers.
Nathan Keller
Stephen D. Miller
Ilya Mironov
Ramarathnam Venkatesan
2006
conf/ccs
Data collection with self-enforcing privacy.
Philippe Golle
Frank McSherry
Ilya Mironov
2006
conf/ches
Cache-Collision Timing Attacks Against AES.
Joseph Bonneau
Ilya Mironov
2006
conf/pkc
Collision-Resistant No More: Hash-and-Sign Paradigm Revisited.
Ilya Mironov
2006
conf/eurocrypt
Our Data, Ourselves: Privacy Via Distributed Noise Generation.
Cynthia Dwork
Krishnaram Kenthapadi
Frank McSherry
Ilya Mironov
Moni Naor
2003
conf/ctrsa
A Secure Signature Scheme from Bilinear Maps.
Dan Boneh
Ilya Mironov
Victor Shoup
2002
conf/crypto
(Not So) Random Shuffles of RC4.
Ilya Mironov
2002
conf/fc
Cryptographic Primitives Enforcing Communication and Storage Complexity.
Philippe Golle
Stanislaw Jarecki
Ilya Mironov
2001
conf/ctrsa
Uncheatable Distributed Computations.
Philippe Golle
Ilya Mironov
2001
conf/eurocrypt
Hash Functions: From Merkle-Damgård to Shoup.
Ilya Mironov
Coauthors
Adriana López-Alt
(1)
Amit Sahai
(2)
Ananth Raghunathan
(2)
Andrew Birrell
(1)
Andy Chu
(1)
Antoine Delignat-Lavaud
(1)
Craig Costello
(1)
Cynthia Dwork
(1)
Dan Boneh
(3)
Divya Gupta
(1)
Douglas Stebila
(1)
Frank McSherry
(2)
Gil Segev
(4)
H. Brendan McMahan
(1)
Ian J. Goodfellow
(1)
Ido Shahaf
(1)
Ilya Mironov
(26)
Joppe W. Bos
(1)
Joseph Bonneau
(1)
Krishnaram Kenthapadi
(1)
Kunal Talwar
(1)
Léo Ducas
(1)
Li Zhang
(1)
Martín Abadi
(3)
Matthew Jagielski
(1)
Michael Naehrig
(1)
Moni Naor
(1)
Nathan Keller
(1)
Nicholas Carlini
(1)
Noah Stephens-Davidowitz
(2)
Omer Reingold
(3)
Omkant Pandey
(4)
Philippe Golle
(3)
Ramarathnam Venkatesan
(1)
Salil P. Vadhan
(2)
Stanislaw Jarecki
(1)
Stephen D. Miller
(1)
Ted Wobber
(1)
Valeria Nikolaenko
(1)
Victor Shoup
(1)
Vipul Goyal
(1)
Yevgeniy Dodis
(2)
Yinglian Xie
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to