The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ilya Mironov: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ilya Mironov, Anton Mityagin, Kobbi Nissim
    Hard Instances of the Constrained Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    ANTS, 2006, pp:582-598 [Conf]
  2. Philippe Golle, Frank McSherry, Ilya Mironov
    Data collection with self-enforcing privacy. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:69-78 [Conf]
  3. Joseph Bonneau, Ilya Mironov
    Cache-Collision Timing Attacks Against AES. [Citation Graph (0, 0)][DBLP]
    CHES, 2006, pp:201-215 [Conf]
  4. Ilya Mironov
    (Not So) Random Shuffles of RC4. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:304-319 [Conf]
  5. Dan Boneh, Ilya Mironov, Victor Shoup
    A Secure Signature Scheme from Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:98-110 [Conf]
  6. Philippe Golle, Ilya Mironov
    Uncheatable Distributed Computations. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:425-440 [Conf]
  7. Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan
    MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:1-19 [Conf]
  8. Cynthia Dwork, Krishnaram Kenthapadi, Frank McSherry, Ilya Mironov, Moni Naor
    Our Data, Ourselves: Privacy Via Distributed Noise Generation. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2006, pp:486-503 [Conf]
  9. Ilya Mironov
    Hash Functions: From Merkle-Damgård to Shoup. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:166-181 [Conf]
  10. Philippe Golle, Stanislaw Jarecki, Ilya Mironov
    Cryptographic Primitives Enforcing Communication and Storage Complexity. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:120-135 [Conf]
  11. Ilya Mironov
    Collision-Resistant No More: Hash-and-Sign Paradigm Revisited. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:140-156 [Conf]
  12. Ilya Mironov, Lintao Zhang
    Applications of SAT Solvers to Cryptanalysis of Hash Functions. [Citation Graph (0, 0)][DBLP]
    SAT, 2006, pp:102-115 [Conf]
  13. Philippe Golle, Kevin Leyton-Brown, Ilya Mironov
    Incentives for sharing in peer-to-peer networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2001, pp:264-267 [Conf]
  14. Philippe Golle, Kevin Leyton-Brown, Ilya Mironov, Mark Lillibridge
    Incentives for Sharing in Peer-to-Peer Networks. [Citation Graph (0, 0)][DBLP]
    WELCOM, 2001, pp:75-87 [Conf]
  15. Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan
    MV3: A new word based stream cipher using rapid mixing and revolving buffers [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  16. Ilya Mironov, Anton Mityagin, Kobbi Nissim
    Hard Instances of the Constrained Discrete Logarithm Problem [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  17. Computational Differential Privacy. [Citation Graph (, )][DBLP]


  18. Domain Extension for Enhanced Target Collision-Resistant Hash Functions. [Citation Graph (, )][DBLP]


  19. Differentially Private Recommender Systems: Building Privacy into the Netflix Prize Contenders. [Citation Graph (, )][DBLP]


  20. Sketching in adversarial environments. [Citation Graph (, )][DBLP]


Search in 0.482secs, Finished in 0.483secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002