Sok: Cryptographically protected database search B Fuller, M Varia, A Yerukhimovich, E Shen, A Hamlin, V Gadepally, ... 2017 IEEE Symposium on Security and Privacy (SP), 172-191, 2017 | 159 | 2017 |
Computing on masked data: a high performance method for improving big data veracity J Kepner, V Gadepally, P Michaleas, N Schear, M Varia, A Yerukhimovich, ... 2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014 | 112 | 2014 |
POPE: Partial order preserving encoding DS Roche, D Apon, SG Choi, A Yerukhimovich Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 95 | 2016 |
A survey of cryptographic approaches to securing big-data analytics in the cloud S Yakoubov, V Gadepally, N Schear, E Shen, A Yerukhimovich 2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014 | 90 | 2014 |
Blockchain technology: what is it good for? S Ruoti, B Kaiser, A Yerukhimovich, J Clark, R Cunningham Communications of the ACM 63 (1), 46-53, 2019 | 72* | 2019 |
Sok: Privacy on mobile devices–it’s complicated C Spensky, J Stewart, A Yerukhimovich, R Shay, A Trachtenberg, ... Proceedings on Privacy Enhancing Technologies, 2016 | 56 | 2016 |
Limits on the power of zero-knowledge proofs in cryptographic constructions Z Brakerski, J Katz, G Segev, A Yerukhimovich Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011 | 55 | 2011 |
Differentially-private multi-party sketching for large-scale statistics SG Choi, D Dachman-Soled, M Kulkarni, A Yerukhimovich Proceedings on Privacy Enhancing Technologies, 2020 | 45 | 2020 |
Limits of computational differential privacy in the client/server setting A Groce, J Katz, A Yerukhimovich Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011 | 35 | 2011 |
Cryptography for Big Data Security. A Hamlin, N Schear, E Shen, M Varia, S Yakoubov, A Yerukhimovich IACR Cryptol. ePrint Arch. 2016, 12, 2016 | 34 | 2016 |
When frodo flips: End-to-end key recovery on frodokem via rowhammer M Fahr Jr, H Kippen, A Kwong, T Dang, J Lichtinger, D Dachman-Soled, ... Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 33 | 2022 |
Computing on masked data to improve the security of big data V Gadepally, B Hancock, B Kaiser, J Kepner, P Michaleas, M Varia, ... 2015 IEEE International Symposium on Technologies for Homeland Security (HST …, 2015 | 30 | 2015 |
Impossibility of blind signatures from one-way permutations J Katz, D Schröder, A Yerukhimovich Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011 …, 2011 | 26 | 2011 |
On black-box constructions of predicate encryption from trapdoor permutations J Katz, A Yerukhimovich International Conference on the Theory and Application of Cryptology and …, 2009 | 25 | 2009 |
Compressed oblivious encoding for homomorphically encrypted search SG Choi, D Dachman-Soled, SD Gordon, L Liu, A Yerukhimovich Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 23 | 2021 |
Compgc: Efficient offline/online semi-honest two-party computation A Groce, A Ledger, AJ Malozemoff, A Yerukhimovich Cryptology ePrint Archive, 2016 | 22 | 2016 |
SoK: Blockchain technology and its potential use cases S Ruoti, B Kaiser, A Yerukhimovich, J Clark, R Cunningham arXiv preprint arXiv:1909.12454, 2019 | 20 | 2019 |
The more the merrier: reducing the cost of large scale MPC SD Gordon, D Starin, A Yerukhimovich Annual International Conference on the Theory and Applications of …, 2021 | 19 | 2021 |
Stormy: Statistics in tor by measuring securely R Wails, A Johnson, D Starin, A Yerukhimovich, SD Gordon Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 19 | 2019 |
Tbac: A tokoin-based accountable access control scheme for the internet of things C Liu, M Xu, H Guo, X Cheng, Y Xiao, D Yu, B Gong, A Yerukhimovich, ... IEEE Transactions on Mobile Computing, 2023 | 16 | 2023 |