Kirill Morozov
Orcid: 0009-0006-4443-083X
According to our database1,
Kirill Morozov
authored at least 60 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the IEEE International Conference on Mobility, 2024
Enhancing the Security of the MAVLink with Symmetric Authenticated Encryption for Drones.
Proceedings of the 11th International Conference on Internet of Things: Systems, 2024
2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the 5th Blockchain and Internet of Things Conference, 2023
Proceedings of the 20th ACS/IEEE International Conference on Computer Systems and Applications, 2023
2022
Proceedings of the 4th IEEE International Conference on Trust, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the 3rd International Conference on Mathematical Research for Blockchain Economy, 2022
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022
2021
Comput. Networks, 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
2020
EW<sub>256357</sub>: A New Secure NIST P-256 Compatible Elliptic Curve for VoIP Applications' Security.
Proceedings of the Security and Privacy in Communication Networks, 2020
2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the Advances in Information and Computer Security, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the Code-Based Cryptography - 7th International Workshop, 2019
Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018
2017
Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions.
J. Supercomput., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM.
IACR Cryptol. ePrint Arch., 2017
Comput. Secur., 2017
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017
Proceedings of the Advances in Information and Computer Security, 2017
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017
2016
Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services.
Int. J. Commun. Syst., 2016
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
2014
LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces.
J. Supercomput., 2014
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE.
Int. J. Netw. Secur., 2014
An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014
Proceedings of the Advances in Information and Computer Security, 2014
2013
Proceedings of the Advances in Information and Computer Security, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
Achieving Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model.
IEEE Trans. Inf. Theory, 2011
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2009
IACR Cryptol. ePrint Arch., 2009
2008
Des. Codes Cryptogr., 2008
Proceedings of the Mathematical Methods in Computer Science, 2008
Proceedings of the 2008 IEEE Information Theory Workshop, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation.
Proceedings of the Information Theoretic Security - Second International Conference, 2007
2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006
2004
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
2001
Proceedings of the Information Assurance in Computer Networks: Methods, 2001