Ilya Mironov

Orcid: 0000-0002-2149-1916

According to our database1, Ilya Mironov authored at least 60 papers between 2001 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Reconciling Security and Communication Efficiency in Federated Learning.
IEEE Data Eng. Bull., 2023

Federated Ensemble Learning: Increasing the Capacity of Label Private Recommendation Systems.
IEEE Data Eng. Bull., 2023

Green Federated Learning.
CoRR, 2023

2022
FEL: High Capacity Learning for Recommendation and Ranking via Federated Ensemble Learning.
CoRR, 2022

Defending against Reconstruction Attacks with Rényi Differential Privacy.
CoRR, 2022

2021
Practical, Label Private Deep Learning Training based on Secure Multiparty Computation and Differential Privacy.
IACR Cryptol. ePrint Arch., 2021

Opacus: User-Friendly Differential Privacy Library in PyTorch.
CoRR, 2021

Wide Network Learning with Differential Privacy.
CoRR, 2021

Antipodes of Label Differential Privacy: PATE and ALIBI.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

2020
Encode, Shuffle, Analyze Privacy Revisited: Formalizations and Empirical Evaluation.
CoRR, 2020

Cryptanalytic Extraction of Neural Network Models.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

2019
Rényi Differential Privacy of the Sampled Gaussian Mechanism.
CoRR, 2019

That which we call private.
CoRR, 2019

Privacy-preserving Data Mining in Industry.
Proceedings of the Companion of The 2019 World Wide Web Conference, 2019

Amplification by Shuffling: From Local to Central Differential Privacy via Anonymity.
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, 2019

2018
Incremental Deterministic Public-Key Encryption.
J. Cryptol., 2018

Scalable Private Learning with PATE.
Proceedings of the 6th International Conference on Learning Representations, 2018

Privacy Amplification by Iteration.
Proceedings of the 59th IEEE Annual Symposium on Foundations of Computer Science, 2018

2017
Strengthening the Security of Encrypted Databases: Non-Transitive JOINs.
IACR Cryptol. ePrint Arch., 2017

Oblivious Stash Shuffle.
CoRR, 2017

On the Protection of Private Information in Machine Learning Systems: Two Recent Approaches.
CoRR, 2017

Prochlo: Strong Privacy for Analytics in the Crowd.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

Rényi Differential Privacy.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

On the Protection of Private Information in Machine Learning Systems: Two Recent Approches.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

2016
Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE.
IACR Cryptol. ePrint Arch., 2016

Deep Learning with Differential Privacy.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Do Distributed Differentially-Private Protocols Require Oblivious Transfer?
IACR Cryptol. ePrint Arch., 2015

Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines.
IACR Cryptol. ePrint Arch., 2015

Message-Locked Encryption for Lock-Dependent Messages.
IACR Cryptol. ePrint Arch., 2015

Hosting Services on an Untrusted Cloud.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
Cryptographic Reverse Firewalls.
IACR Cryptol. ePrint Arch., 2014

Web PKI: Closing the Gap between Guidelines and Practices.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

2013
Privacy via the Johnson-Lindenstrauss Transform.
J. Priv. Confidentiality, 2013

Global Authentication in an Untrustworthy World.
Proceedings of the 14th Workshop on Hot Topics in Operating Systems, 2013

Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2012
Differential Privacy with Imperfect Randomness.
IACR Cryptol. ePrint Arch., 2012

Differential privacy as a protocol constraint.
Proceedings of the 2012 IEEE Information Theory Workshop, 2012

On significance of the least significant bits for differential privacy.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Sketching in Adversarial Environments.
SIAM J. Comput., 2011

The Limits of Two-Party Differential Privacy.
Electron. Colloquium Comput. Complex., 2011

Publicly Verifiable Secret Sharing for Cloud-Based Key Management.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

2010
Domain Extension for Enhanced Target Collision-Resistant Hash Functions.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

2009
Differentially Private Recommender Systems: Building Privacy into the Netflix Prize Contenders.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

Computational Differential Privacy.
Proceedings of the Advances in Cryptology, 2009

2008
Data Collection with Self-Enforcing Privacy.
ACM Trans. Inf. Syst. Secur., 2008

2006
Applications of SAT Solvers to Cryptanalysis of Hash Functions.
IACR Cryptol. ePrint Arch., 2006

Hard Instances of the Constrained Discrete Logarithm Problem.
IACR Cryptol. ePrint Arch., 2006

MV3: A new word based stream cipher using rapid mixing and revolving buffers.
IACR Cryptol. ePrint Arch., 2006

Collision-Resistant No More: Hash-and-Sign Paradigm Revisited.
Proceedings of the Public Key Cryptography, 2006

Our Data, Ourselves: Privacy Via Distributed Noise Generation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006

Cache-Collision Timing Attacks Against AES.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006

2004
Application of analysis of algorithms in cryptography.
PhD thesis, 2004

2003
A Secure Signature Scheme from Bilinear Maps.
Proceedings of the Topics in Cryptology, 2003

2002
(Not So) Random Shuffles of RC4.
IACR Cryptol. ePrint Arch., 2002

Cryptographic Primitives Enforcing Communication and Storage Complexity.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

2001
A Note on Cryptanalysis of the Preliminary Version of the NTRU Signature Scheme.
IACR Cryptol. ePrint Arch., 2001

Incentives for Sharing in Peer-to-Peer Networks.
Proceedings of the Electronic Commerce, Second International Workshop, 2001

Incentives for sharing in peer-to-peer networks.
Proceedings of the Proceedings 3rd ACM Conference on Electronic Commerce (EC-2001), 2001

Hash Functions: From Merkle-Damgård to Shoup.
Proceedings of the Advances in Cryptology, 2001

Uncheatable Distributed Computations.
Proceedings of the Topics in Cryptology, 2001


  Loading...