Vladimir Kolesnikov
Orcid: 0000-0002-0211-1244Affiliations:
- Georgia Institute of Technology, GA, USA
According to our database1,
Vladimir Kolesnikov
authored at least 108 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Electron. Colloquium Comput. Complex., 2023
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2023
2022
J. Comput. Secur., 2022
Selected papers from CSCML 2020, the 4th International Symposium on Cyber Security Cryptology and Machine Learning.
Inf. Comput., 2022
Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached RAM for ANSI C Programs.
IACR Cryptol. ePrint Arch., 2022
Efficient Generic Arithmetic for KKW Practical Linear: MPC-in-the-Head NIZK on Commodity Hardware without Trusted Setup.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Fuzzy Labeled Private Set Intersection with Applications to Private Real-Time Biometric Search.
Proceedings of the 30th USENIX Security Symposium, 2021
Zero Knowledge for Everything and Everyone: Fast ZK Processor with Cached ORAM for ANSI C Programs.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
2019
Theor. Comput. Sci., 2019
IACR Cryptol. ePrint Arch., 2019
Addressing the Fragmentation Problem in Distributed and Decentralized Edge Computing: A Vision.
Proceedings of the IEEE International Conference on Cloud Engineering, 2019
2018
IEEE Trans. Smart Grid, 2018
Free IF: How to Omit Inactive Branches and Implement S-Universal Garbled Circuit (Almost) for Free.
IACR Cryptol. ePrint Arch., 2018
Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Found. Trends Priv. Secur., 2018
$$\mathsf {Free\ }{} \mathtt{IF} $$ : How to Omit Inactive Branches and Implement <i>S</i> -Universal Garbled Circuit (Almost) for Free.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
2015
J. Math. Cryptol., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
2013
A systematic approach to practically efficient general two-party secure function evaluation protocols and their modular design.
J. Comput. Secur., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
TSAF: Tamper-resistant and scalable mutual authentication framework for plug-in EV charging.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013
Towards Efficient Private Distributed Computation on Unbounded Input Streams - (Extended Abstract).
Proceedings of the Applied Cryptography and Network Security, 2013
2012
Bell Labs Tech. J., 2012
Brief Announcement: Efficient Private Distributed Computation on Unbounded Input Streams.
Proceedings of the Distributed Computing - 26th International Symposium, 2012
Resilient end-to-end message protection for large-scale cyber-physical system communications.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
2011
J. Commun., 2011
IACR Cryptol. ePrint Arch., 2011
A Survey and Analysis of Media Keying Techniques in the Session Initiation Protocol (SIP).
IEEE Commun. Surv. Tutorials, 2011
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011
Proceedings of the Innovations in Computer Science, 2011
2010
Efficient Secure Two-Party Computation with Untrusted Hardware Tokens (Full Version).
Proceedings of the Towards Hardware-Intrinsic Security - Foundations and Practice, 2010
From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design.
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs.
IACR Cryptol. ePrint Arch., 2010
IEEE Commun. Mag., 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010
A secure and lightweight scheme for media keying in the session initiation protocol (SIP): work in progress.
Proceedings of the Principles, 2010
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version).
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
2009
Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima.
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the First IEEE International Workshop on Information Forensics and Security, 2009
Proceedings of the 47th Annual Allerton Conference on Communication, 2009
2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008
A Practical Universal Circuit Construction and Secure Evaluation of Private Functions.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008
2006
Proceedings of the Financial Cryptography and Data Security, 2006
2005
Proceedings of the Advances in Cryptology, 2005
2004
Proceedings of the Advances in Cryptology, 2004