default search action
Valeria Nikolaenko
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2017
- [b1]Valeria Nikolaenko:
Studies in secure computation: post-quantum, attribute-based and multi-party. Stanford University, USA, 2017
Conference and Workshop Papers
- 2024
- [c13]Valeria Nikolaenko, Sam Ragsdale, Joseph Bonneau, Dan Boneh:
Powers-of-Tau to the People: Decentralizing Setup Ceremonies. ACNS (3) 2024: 105-134 - 2023
- [c12]Donald Beaver, Konstantinos Chalkias, Mahimna Kelkar, Lefteris Kokoris-Kogias, Kevin Lewi, Ladi de Naurois, Valeria Nikolaenko, Arnab Roy, Alberto Sonnino:
STROBE: Streaming Threshold Random Beacons. AFT 2023: 7:1-7:16 - 2021
- [c11]François Garillot, Yashvanth Kondi, Payman Mohassel, Valeria Nikolaenko:
Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions. CRYPTO (1) 2021: 127-156 - [c10]Konstantinos Chalkias, François Garillot, Yashvanth Kondi, Valeria Nikolaenko:
Non-interactive Half-Aggregation of EdDSA and Variants of Schnorr Signatures. CT-RSA 2021: 577-608 - [c9]Panagiotis Chatzigiannis, Konstantinos Chalkias, Valeria Nikolaenko:
Homomorphic Decryption in Blockchains via Compressed Discrete-Log Lookup Tables. DPM/CBT@ESORICS 2021: 328-339 - 2020
- [c8]Sarah Azouvi, George Danezis, Valeria Nikolaenko:
Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems. AFT 2020: 189-201 - [c7]Konstantinos Chalkias, François Garillot, Valeria Nikolaenko:
Taming the Many EdDSAs. SSR 2020: 67-90 - 2017
- [c6]Dan Boneh, Sam Kim, Valeria Nikolaenko:
Lattice-Based DAPS and Generalizations: Self-enforcement in Signature Schemes. ACNS 2017: 457-477 - [c5]Valeria Nikolaenko:
Practical post-quantum key agreement from generic lattices (invited talk). STOC 2017: 8 - 2016
- [c4]Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila:
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE. CCS 2016: 1006-1018 - 2014
- [c3]Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy:
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits. EUROCRYPT 2014: 533-556 - 2013
- [c2]Valeria Nikolaenko, Stratis Ioannidis, Udi Weinsberg, Marc Joye, Nina Taft, Dan Boneh:
Privacy-preserving matrix factorization. CCS 2013: 801-812 - [c1]Valeria Nikolaenko, Udi Weinsberg, Stratis Ioannidis, Marc Joye, Dan Boneh, Nina Taft:
Privacy-Preserving Ridge Regression on Hundreds of Millions of Records. IEEE Symposium on Security and Privacy 2013: 334-348
Informal and Other Publications
- 2024
- [i12]Ertem Nusret Tas, István András Seres, Yinuo Zhang, Márk Melczer, Mahimna Kelkar, Joseph Bonneau, Valeria Nikolaenko:
Atomic and Fair Data Exchange via Blockchain. IACR Cryptol. ePrint Arch. 2024: 418 (2024) - 2022
- [i11]Valeria Nikolaenko, Sam Ragsdale, Joseph Bonneau, Dan Boneh:
Powers-of-Tau to the People: Decentralizing Setup Ceremonies. IACR Cryptol. ePrint Arch. 2022: 1592 (2022) - 2021
- [i10]Konstantinos Chalkias, François Garillot, Yashvanth Kondi, Valeria Nikolaenko:
Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures. IACR Cryptol. ePrint Arch. 2021: 350 (2021) - [i9]Panagiotis Chatzigiannis, Konstantinos Chalkias, Valeria Nikolaenko:
Homomorphic decryption in blockchains via compressed discrete-log lookup tables. IACR Cryptol. ePrint Arch. 2021: 899 (2021) - [i8]François Garillot, Yashvanth Kondi, Payman Mohassel, Valeria Nikolaenko:
Threshold Schnorr with Stateless Deterministic Signing from Standard Assumptions. IACR Cryptol. ePrint Arch. 2021: 1055 (2021) - 2020
- [i7]Konstantinos Chalkias, Kevin Lewi, Payman Mohassel, Valeria Nikolaenko:
Distributed Auditing Proofs of Liabilities. IACR Cryptol. ePrint Arch. 2020: 468 (2020) - [i6]Konstantinos Chalkias, François Garillot, Valeria Nikolaenko:
Taming the many EdDSAs. IACR Cryptol. ePrint Arch. 2020: 1244 (2020) - 2019
- [i5]Sarah Azouvi, George Danezis, Valeria Nikolaenko:
Winkle: Foiling Long-Range Attacks in Proof-of-Stake Systems. IACR Cryptol. ePrint Arch. 2019: 1440 (2019) - 2016
- [i4]Joppe W. Bos, Craig Costello, Léo Ducas, Ilya Mironov, Michael Naehrig, Valeria Nikolaenko, Ananth Raghunathan, Douglas Stebila:
Frodo: Take off the ring! Practical, Quantum-Secure Key Exchange from LWE. IACR Cryptol. ePrint Arch. 2016: 659 (2016) - 2014
- [i3]Dan Boneh, Craig Gentry, Sergey Gorbunov, Shai Halevi, Valeria Nikolaenko, Gil Segev, Vinod Vaikuntanathan, Dhinakaran Vinayagamurthy:
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE, and Compact Garbled Circuits. IACR Cryptol. ePrint Arch. 2014: 356 (2014) - 2013
- [i2]Dan Boneh, Valeria Nikolaenko, Gil Segev:
Attribute-Based Encryption for Arithmetic Circuits. IACR Cryptol. ePrint Arch. 2013: 669 (2013) - 2011
- [i1]Edward A. Hirsch, Dmitry Itsykson, Valeria Nikolaenko, Alexander Smal:
Optimal heuristic algorithms for the image of an injective function. Electron. Colloquium Comput. Complex. TR11 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 20:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint