What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Vladimir Kolesnikov
Google Scholar
57
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/crypto
Stationary Syndrome Decoding for Improved PCGs.
Vladimir Kolesnikov
Stanislav Peceny
Srinivasan Raghuraman
Peter Rindal
2025
conf/crypto
Multiparty Garbling from OT with Linear Scaling and RAM Support.
David Heath
Vladimir Kolesnikov
Varun Narayanan
Rafail Ostrovsky
Akash Shah
2024
conf/ccs
Tight ZK CPU: Batched ZK Branching with Cost Proportional to Evaluated Instruction.
Yibin Yang
David Heath
Carmit Hazay
Vladimir Kolesnikov
Muthuramakrishnan Venkitasubramaniam
2024
conf/crypto
Malicious Security for SCALES - Outsourced Computation with Ephemeral Servers.
Anasuya Acharya
Carmit Hazay
Vladimir Kolesnikov
Manoj Prabhakaran
2024
conf/eurocrypt
Garbled Circuit Lookup Tables with Logarithmic Number of Ciphertexts.
David Heath
Vladimir Kolesnikov
Lucien K. L. Ng
2024
conf/asiacrypt
sfLogRobin++: Optimizing Proofs of Disjunctive Statements in VOLE-Based ZK.
Carmit Hazay
David Heath
Vladimir Kolesnikov
Muthuramakrishnan Venkitasubramaniam
Yibin Yang
2023
conf/ccs
Batchman and Robin: Batched and Non-batched Branching for Interactive ZK.
Yibin Yang
David Heath
Carmit Hazay
Vladimir Kolesnikov
Muthuramakrishnan Venkitasubramaniam
2023
conf/ccs
Towards Generic MPC Compilers via Variable Instruction Set Architectures (VISAs).
Yibin Yang
Stanislav Peceny
David Heath
Vladimir Kolesnikov
2023
conf/crypto
Tri-State Circuits - A Circuit Model that Captures RAM.
David Heath
Vladimir Kolesnikov
Rafail Ostrovsky
2022
conf/eurosp
EZEE: Epoch Parallel Zero Knowledge for ANSI C.
Yibin Yang
David Heath
Vladimir Kolesnikov
David Devecsery
2022
conf/eurocrypt
Garbled Circuits with Sublinear Evaluator.
Abida Haque
David Heath
Vladimir Kolesnikov
Steve Lu
Rafail Ostrovsky
Akash Shah
2022
conf/eurocrypt
EpiGRAM: Practical Garbled RAM.
David Heath
Vladimir Kolesnikov
Rafail Ostrovsky
2022
conf/tcc
SCALES - MPC with Small Clients and Larger Ephemeral Servers.
Anasuya Acharya
Carmit Hazay
Vladimir Kolesnikov
Manoj Prabhakaran
2021
conf/ccs
One Hot Garbling.
David Heath
Vladimir Kolesnikov
2021
conf/uss
Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search.
Erkam Uzun
Simon P. Chung
Vladimir Kolesnikov
Alexandra Boldyreva
Wenke Lee
2021
conf/sp
Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached ORAM for ANSI C Programs.
David Heath
Yibin Yang
David Devecsery
Vladimir Kolesnikov
2021
conf/asiaccs
Cryptographic Key Derivation from Biometric Inferences for Remote Authentication.
Erkam Uzun
Carter Yagemann
Simon P. Chung
Vladimir Kolesnikov
Wenke Lee
2021
conf/pkc
Masked Triples - Amortizing Multiplication Triples Across Conditionals.
David Heath
Vladimir Kolesnikov
Stanislav Peceny
2021
conf/eurocrypt
sf LogStack: Stacked Garbling with O(b log b) Computation.
David Heath
Vladimir Kolesnikov
2021
conf/asiacrypt
Garbling, Stacked and Staggered - Faster k-out-of-n Garbled Function Evaluation.
David Heath
Vladimir Kolesnikov
Stanislav Peceny
2021
conf/asiacrypt
) Authenticated Shares ZK ORAM.
David Heath
Vladimir Kolesnikov
2020
conf/ccs
A 2.1 KHz Zero-Knowledge Processor with BubbleRAM.
David Heath
Vladimir Kolesnikov
2020
conf/crypto
Stacked Garbling - Garbled Circuit Proportional to Longest Execution Path.
David Heath
Vladimir Kolesnikov
2020
conf/eurocrypt
Stacked Garbling for Disjunctive Zero-Knowledge Proofs.
David Heath
Vladimir Kolesnikov
2020
conf/asiacrypt
MOTIF: (Almost) Free Branching in GMW - Via Vector-Scalar Multiplication.
David Heath
Vladimir Kolesnikov
Stanislav Peceny
2019
conf/eurocrypt
Covert Security with Public Verifiability: Faster, Leaner, and Simpler.
Cheng Hong
Jonathan Katz
Vladimir Kolesnikov
Wen-jie Lu
Xiao Wang
2019
conf/asiacrypt
Scalable Private Set Union from Symmetric-Key Techniques.
Vladimir Kolesnikov
Mike Rosulek
Ni Trieu
Xiao Wang
2018
conf/ccs
Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures.
Jonathan Katz
Vladimir Kolesnikov
Xiao Wang
2018
conf/fc
SWiM: Secure Wildcard Pattern Matching from OT Extension.
Vladimir Kolesnikov
Mike Rosulek
Ni Trieu
2018
conf/asiacrypt
-Universal Garbled Circuit (Almost) for Free.
Vladimir Kolesnikov
2017
conf/ccs
Practical Multi-party Private Set Intersection from Symmetric-Key Techniques.
Vladimir Kolesnikov
Naor Matania
Benny Pinkas
Mike Rosulek
Ni Trieu
2017
conf/ccs
DUPLO: Unifying Cut-and-Choose for Garbled Circuits.
Vladimir Kolesnikov
Jesper Buus Nielsen
Mike Rosulek
Ni Trieu
Roberto Trifiletti
2017
conf/eurocrypt
Hashing Garbled Circuits for Free.
Xiong Fan
Chaya Ganesh
Vladimir Kolesnikov
2017
conf/asiacrypt
Overlaying Conditional Circuit Clauses for Secure Computation.
W. Sean Kennedy
Vladimir Kolesnikov
Gordon T. Wilfong
2016
conf/ccs
Attribute-based Key Exchange with General Policies.
Vladimir Kolesnikov
Hugo Krawczyk
Yehuda Lindell
Alex J. Malozemoff
Tal Rabin
2016
conf/ccs
Efficient Batched Oblivious PRF with Applications to Private Set Intersection.
Vladimir Kolesnikov
Ranjit Kumaresan
Mike Rosulek
Ni Trieu
2015
conf/sp
Malicious-Client Security in Blind Seer: A Scalable Private DBMS.
Ben A. Fisch
Binh Vo
Fernando Krell
Abishek Kumarasubramanian
Vladimir Kolesnikov
Tal Malkin
Steven M. Bellovin
2015
conf/asiacrypt
Public Verifiability in the Covert Model (Almost) for Free.
Vladimir Kolesnikov
Alex J. Malozemoff
2015
conf/asiacrypt
On Cut-and-Choose Oblivious Transfer and Its Variants.
Vladimir Kolesnikov
Ranjit Kumaresan
2015
conf/tcc
Richer Efficiency/Security Trade-offs in 2PC.
Vladimir Kolesnikov
Payman Mohassel
Ben Riva
Mike Rosulek
2014
conf/crypto
Amortizing Garbled Circuits.
Yan Huang
Jonathan Katz
Vladimir Kolesnikov
Ranjit Kumaresan
Alex J. Malozemoff
2014
conf/crypto
FleXOR: Flexible Garbling for XOR Gates That Beats Free-XOR.
Vladimir Kolesnikov
Payman Mohassel
Mike Rosulek
2014
conf/sp
Blind Seer: A Scalable Private DBMS.
Vasilis Pappas
Fernando Krell
Binh Vo
Vladimir Kolesnikov
Tal Malkin
Seung Geol Choi
Wesley George
Angelos D. Keromytis
Steven M. Bellovin
2013
conf/crypto
Improved OT Extension for Transferring Short Secrets.
Vladimir Kolesnikov
Ranjit Kumaresan
2013
conf/acns
Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract).
Shlomi Dolev
Juan A. Garay
Niv Gilboa
Vladimir Kolesnikov
Yelena Yuditsky
2012
conf/ccs
Secure two-party computation in sublinear (amortized) time.
S. Dov Gordon
Jonathan Katz
Vladimir Kolesnikov
Fernando Krell
Tal Malkin
Mariana Raykova
Yevgeniy Vahlis
2012
conf/cans
Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation.
Vladimir Kolesnikov
Ranjit Kumaresan
Abdullatif Shikfa
2010
conf/fc
Embedded SFE: Offloading Server and Network Using Hardware Tokens.
Kimmo Järvinen
Vladimir Kolesnikov
Ahmad-Reza Sadeghi
Thomas Schneider
2010
conf/ches
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version).
Kimmo Järvinen
Vladimir Kolesnikov
Ahmad-Reza Sadeghi
Thomas Schneider
2010
conf/tcc
Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens.
Vladimir Kolesnikov
2009
conf/esorics
Secure Evaluation of Private Linear Branching Programs with Medical Applications.
Mauro Barni
Pierluigi Failla
Vladimir Kolesnikov
Riccardo Lazzeretti
Ahmad-Reza Sadeghi
Thomas Schneider
2009
conf/cans
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
Vladimir Kolesnikov
Ahmad-Reza Sadeghi
Thomas Schneider
2008
conf/fc
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions.
Vladimir Kolesnikov
Thomas Schneider
2006
conf/fc
Conditional Encrypted Mapping and Comparing Encrypted Numbers.
Ian F. Blake
Vladimir Kolesnikov
2006
conf/tcc
Key Exchange Using Passwords and Long Keys.
Vladimir Kolesnikov
Charles Rackoff
2005
conf/asiacrypt
Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation.
Vladimir Kolesnikov
2004
conf/asiacrypt
Strong Conditional Oblivious Transfer and Computing on Intervals.
Ian F. Blake
Vladimir Kolesnikov
Coauthors
Abdullatif Shikfa
(1)
Abida Haque
(1)
Abishek Kumarasubramanian
(1)
Ahmad-Reza Sadeghi
(4)
Akash Shah
(2)
Alex J. Malozemoff
(3)
Alexandra Boldyreva
(1)
Anasuya Acharya
(2)
Angelos D. Keromytis
(1)
Ben A. Fisch
(1)
Ben Riva
(1)
Benny Pinkas
(1)
Binh Vo
(2)
Carmit Hazay
(5)
Carter Yagemann
(1)
Charles Rackoff
(1)
Chaya Ganesh
(1)
Cheng Hong
(1)
David Devecsery
(2)
David Heath
(20)
Erkam Uzun
(2)
Fernando Krell
(3)
Gordon T. Wilfong
(1)
Hugo Krawczyk
(1)
Ian F. Blake
(2)
Jesper Buus Nielsen
(1)
Jonathan Katz
(4)
Juan A. Garay
(1)
Kimmo Järvinen
(2)
Lucien K. L. Ng
(1)
Manoj Prabhakaran
(2)
Mariana Raykova
(1)
Mauro Barni
(1)
Mike Rosulek
(7)
Muthuramakrishnan Venkitasubramaniam
(3)
Naor Matania
(1)
Ni Trieu
(5)
Niv Gilboa
(1)
Payman Mohassel
(2)
Peter Rindal
(1)
Pierluigi Failla
(1)
Rafail Ostrovsky
(4)
Ranjit Kumaresan
(5)
Riccardo Lazzeretti
(1)
Roberto Trifiletti
(1)
S. Dov Gordon
(1)
Seung Geol Choi
(1)
Shlomi Dolev
(1)
Simon P. Chung
(2)
Srinivasan Raghuraman
(1)
Stanislav Peceny
(5)
Steve Lu
(1)
Steven M. Bellovin
(2)
Tal Malkin
(3)
Tal Rabin
(1)
Thomas Schneider
(5)
Varun Narayanan
(1)
Vasilis Pappas
(1)
Vladimir Kolesnikov
(57)
W. Sean Kennedy
(1)
Wen-jie Lu
(1)
Wenke Lee
(2)
Wesley George
(1)
Xiao Wang
(3)
Xiong Fan
(1)
Yan Huang
(1)
Yehuda Lindell
(1)
Yelena Yuditsky
(1)
Yevgeniy Vahlis
(1)
Yibin Yang
(6)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to