Items where Author is "Pryvalov, Ivan"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 9.

Backes, Michael and Berrang, Pascal and Hanzlik, Lucjan and Pryvalov, Ivan
(2022) A framework for constructing Single Secret Leader Election from MPC.
In: ESORICS 2022.
Conference: ESORICS European Symposium On Research In Computer Security
(In Press)

Backes, Michael and Hanzlik, Lucjan and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2019) Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup.
In: PKC 2019.
Conference: PKC International Conference on Practice and Theory in Public Key Cryptography
(In Press)

Backes, Michael and Herzberg, Amir and Kate, Aniket and Pryvalov, Ivan
(2016) Anonymous RAM.
In: 21st European Symposium on Research in Computer Security (ESORICS).
Conference: ESORICS European Symposium On Research In Computer Security

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2015) Achieving Optimal Utility for Distributed Differential Privacy Using SMPC.
In: UNSPECIFIED Cryptology and Information Security Series, 13 . IOS Press, 81 - 105.

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Differentially Private Data Aggregation with Optimal Utility.
UNSPECIFIED
.

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Differentially Private Data Aggregation with Optimal Utility.
In: 30th Annual Computer Security Applications Conference (ACSAC).
Conference: ACSAC Annual Computer Security Applications Conference

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Privacy-preserving Data Aggregation with Optimal Utility Using Arithmetic SMC -- Extended Abstract.
In: Workshop on Usable and Efficient Secure Multiparty Computation -- Satellite Event of ESORICS.

Pryvalov, Ivan and Kate, Aniket
(2014) Introducing Fault Tolerance into Threshold Password-Authenticated Key Exchange.
IACR Cryptology ePrint Archive, 2014. p. 247.

Eigner, Fabienne and Kate, Aniket and Maffei, Matteo and Pampaloni, Francesca and Pryvalov, Ivan
(2014) Privacy-preserving Data Aggregation with Optimal Utility.
IACR Cryptology ePrint Archive, 2014. p. 482.

This list was generated on Thu Nov 21 11:49:14 2024 CET.