|
Search the dblp DataBase
Vladimir Kolesnikov:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Ian F. Blake, Vladimir Kolesnikov
Strong Conditional Oblivious Transfer and Computing on Intervals. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2004, pp:515-529 [Conf]
- Vladimir Kolesnikov
Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 2005, pp:136-155 [Conf]
- Ian F. Blake, Vladimir Kolesnikov
Conditional Encrypted Mapping and Comparing Encrypted Numbers. [Citation Graph (0, 0)][DBLP] Financial Cryptography, 2006, pp:206-220 [Conf]
- Vladimir Kolesnikov, Charles Rackoff
Key Exchange Using Passwords and Long Keys. [Citation Graph (0, 0)][DBLP] TCC, 2006, pp:100-119 [Conf]
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. [Citation Graph (, )][DBLP]
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version). [Citation Graph (, )][DBLP]
Secure Evaluation of Private Linear Branching Programs with Medical Applications. [Citation Graph (, )][DBLP]
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions. [Citation Graph (, )][DBLP]
Embedded SFE: Offloading Server and Network Using Hardware Tokens. [Citation Graph (, )][DBLP]
Improved Garbled Circuit: Free XOR Gates and Applications. [Citation Graph (, )][DBLP]
Password Mistyping in Two-Factor-Authenticated Key Exchange. [Citation Graph (, )][DBLP]
MAC Precomputation with Applications to Secure Memory. [Citation Graph (, )][DBLP]
Brief announcement: swarming secrets. [Citation Graph (, )][DBLP]
A Security Enhancement and Proof for Authentication and Key Agreement (AKA). [Citation Graph (, )][DBLP]
Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens. [Citation Graph (, )][DBLP]
Advances and impact of secure function evaluation. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|