The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Vladimir Kolesnikov: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ian F. Blake, Vladimir Kolesnikov
    Strong Conditional Oblivious Transfer and Computing on Intervals. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:515-529 [Conf]
  2. Vladimir Kolesnikov
    Gate Evaluation Secret Sharing and Secure One-Round Two-Party Computation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:136-155 [Conf]
  3. Ian F. Blake, Vladimir Kolesnikov
    Conditional Encrypted Mapping and Comparing Encrypted Numbers. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:206-220 [Conf]
  4. Vladimir Kolesnikov, Charles Rackoff
    Key Exchange Using Passwords and Long Keys. [Citation Graph (0, 0)][DBLP]
    TCC, 2006, pp:100-119 [Conf]

  5. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. [Citation Graph (, )][DBLP]


  6. Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version). [Citation Graph (, )][DBLP]


  7. Secure Evaluation of Private Linear Branching Programs with Medical Applications. [Citation Graph (, )][DBLP]


  8. A Practical Universal Circuit Construction and Secure Evaluation of Private Functions. [Citation Graph (, )][DBLP]


  9. Embedded SFE: Offloading Server and Network Using Hardware Tokens. [Citation Graph (, )][DBLP]


  10. Improved Garbled Circuit: Free XOR Gates and Applications. [Citation Graph (, )][DBLP]


  11. Password Mistyping in Two-Factor-Authenticated Key Exchange. [Citation Graph (, )][DBLP]


  12. MAC Precomputation with Applications to Secure Memory. [Citation Graph (, )][DBLP]


  13. Brief announcement: swarming secrets. [Citation Graph (, )][DBLP]


  14. A Security Enhancement and Proof for Authentication and Key Agreement (AKA). [Citation Graph (, )][DBLP]


  15. Truly Efficient String Oblivious Transfer Using Resettable Tamper-Proof Tokens. [Citation Graph (, )][DBLP]


  16. Advances and impact of secure function evaluation. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002