Sophia Yakoubov
Sophia Yakoubov
Bestätigte E-Mail-Adresse bei bu.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A Decentralized Public Key Infrastructure with Identity Retention.
C Fromknecht, D Velicanu, S Yakoubov
IACR Cryptology ePrint Archive 2014, 803, 2014
1422014
Certcoin: A namecoin based decentralized authentication system
C Fromknecht, D Velicanu, S Yakoubov
Massachusetts Inst. Technol., Cambridge, MA, USA, Tech. Rep 6, 46-56, 2014
78*2014
A survey of cryptographic approaches to securing big-data analytics in the cloud
S Yakoubov, V Gadepally, N Schear, E Shen, A Yerukhimovich
2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014
522014
Accumulators with applications to anonymity-preserving revocation
F Baldimtsi, J Camenisch, M Dubovitskaya, A Lysyanskaya, L Reyzin, ...
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 301-315, 2017
302017
Hetest: a homomorphic encryption testing framework
M Varia, S Yakoubov, Y Yang
International Conference on Financial Cryptography and Data Security, 213-230, 2015
232015
Efficient asynchronous accumulators for distributed PKI
L Reyzin, S Yakoubov
International Conference on Security and Cryptography for Networks, 292-309, 2016
202016
Cryptography for big data security
A Hamlin, N Schear, E Shen, M Varia, S Yakoubov, A Yerukhimovich
Big Data: Storage, Sharing, and Security (3S), 241-288, 2016
182016
Automated assessment of secure search systems
M Varia, B Price, N Hwang, A Hamlin, J Herzog, J Poland, M Reschly, ...
ACM SIGOPS Operating Systems Review 49 (1), 22-30, 2015
162015
Pattern Avoidance in Extensions of Comb-Like Posets
S Yakoubov
arXiv preprint arXiv:1310.2979, 2013
92013
Fuzzy Password-Authenticated Key Exchange
PA Dupont, J Hesse, D Pointcheval, L Reyzin, S Yakoubov
Annual International Conference on the Theory and Applications of …, 2018
8*2018
Turning HATE Into LOVE: Homomorphic Ad Hoc Threshold Encryption for Scalable MPC.
L Reyzin, AD Smith, S Yakoubov
IACR Cryptology ePrint Archive 2018, 997, 2018
62018
Catching MPC cheaters: Identification and openability
R Cunningham, B Fuller, S Yakoubov
International Conference on Information Theoretic Security, 110-134, 2017
62017
A Gentle Introduction to Yao’s Garbled Circuits
S Yakoubov
4
Secure Multiparty Computation for Cooperative Cyber Risk Assessment
K Hogan, N Luther, N Schear, E Shen, D Stott, S Yakoubov, ...
Cybersecurity Development (SecDev), IEEE, 75-76, 2016
32016
Universally composable accumulators
F Badimtsi, R Canetti, S Yakoubov
Cryptographers’ Track at the RSA Conference, 638-666, 2020
22020
Stronger Notions and a More Efficient Construction of Threshold Ring Signatures
A Munch-Hansen, C Orlandi, S Yakoubov
12020
Security and Privacy Assurance Research (SPAR) Pilot Final Report
B Fuller, D Mitchell, R Cunningham, U Blumenthal, P Cable, A Hamlin, ...
MIT Lincoln Laboratory Lexington United States, 2015
12015
Stronger Notions and Constructions for Multi-Designated Verifier Signatures.
I Damgård, H Haagh, R Mercer, A Nitulescu, C Orlandi, S Yakoubov
IACR Cryptol. ePrint Arch. 2019, 1153, 2019
2019
Cryptography for Big Data Security
AB Yerukhimovich, NA Schear, EH Shen, MH Varia, AT Hamlin, ...
MIT Lincoln Laboratory Lexington United States, 2015
2015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–19