Yevgeniy Vahlis
Yevgeniy Vahlis
Head of Artificial Intelligence Technology at BMO
Verified email at bmo.com - Homepage
Title
Cited by
Cited by
Year
Verifiable delegation of computation over large datasets
S Benabbas, R Gennaro, Y Vahlis
Annual Cryptology Conference, 111-131, 2011
3452011
Secure two-party computation in sublinear (amortized) time
SD Gordon, J Katz, V Kolesnikov, F Krell, T Malkin, M Raykova, Y Vahlis
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
1572012
Signatures resilient to continual leakage on memory and computation
T Malkin, I Teranishi, Y Vahlis, M Yung
Theory of Cryptography Conference, 89-106, 2011
1042011
Protecting cryptographic keys against continual leakage
A Juma, Y Vahlis
Annual Cryptology Conference, 41-58, 2010
932010
CCA2 secure IBE: standard model efficiency through authenticated symmetric encryption
E Kiltz, Y Vahlis
Cryptographers’ Track at the RSA Conference, 221-238, 2008
932008
On the impossibility of basing identity based encryption on trapdoor permutations
D Boneh, P Papakonstantinou, C Rackoff, Y Vahlis, B Waters
2008 49th Annual IEEE Symposium on Foundations of Computer Science, 283-292, 2008
602008
Two is a crowd? a black-box separation of one-wayness and security under correlated inputs
Y Vahlis
Theory of Cryptography Conference, 165-182, 2010
282010
EyeDecrypt—Private interactions in plain sight
AG Forte, JA Garay, T Jim, Y Vahlis
International Conference on Security and Cryptography for Networks, 255-276, 2014
202014
Is it really you? user identification via adaptive behavior fingerprinting
P Giura, I Murynets, R Piqueras Jover, Y Vahlis
Proceedings of the 4th ACM conference on Data and application security and …, 2014
172014
How powerful are the DDH hard groups?
PA Papakonstantinou, C Rackoff, Y Vahlis
Electronic Colloquium on Computational Complexity (ECCC) 19, 167, 2012
72012
Multi-location leakage resilient cryptography
A Juma, Y Vahlis, M Yung
International Workshop on Public Key Cryptography, 504-521, 2012
32012
Secure Key Exchange and Sessions Without Credentials
V Kolesnikov, C Rackoff, Y Vahlis
2*
Efficient Network-Based Enforcement of Data Access Rights
P Giura, V Kolesnikov, A Tentes, Y Vahlis
International Conference on Security and Cryptography for Networks, 236-254, 2014
2014
Unidirectional Lambek Grammars in Polynomial Time
PA Papakonstantinou, G Penn, Y Vahlis
2007
EyeDecrypt—Private Interactions in Plain Sight
AFJGT Jim, Y Vahlis
Research projects
SG Choi, B Fisch, A Keromytis, V Kolesnikov, A Kumarasubramanian, ...
PriSec 2014
C Alcaraz, S Dolev, Y Vahlis, G Pernul, C Morisset, D Gollmann, Y Xiang, ...
The system can't perform the operation now. Try again later.
Articles 1–17