Semantic security for the McEliece cryptosystem without random oracles R Nojima, H Imai, K Kobara, K Morozov Designs, Codes and Cryptography 49, 289-305, 2008 | 160 | 2008 |
A decentralized marketplace application on the ethereum blockchain VP Ranganthan, R Dantu, A Paul, P Mears, K Morozov 2018 IEEE 4th International Conference on Collaboration and Internet …, 2018 | 138 | 2018 |
Efficient unconditional oblivious transfer from almost any noisy channel C Crépeau, K Morozov, S Wolf International Conference on Security in Communication Networks, 47-59, 2004 | 129 | 2004 |
Unfair noisy channels and oblivious transfer I Damgård, S Fehr, K Morozov, L Salvail Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004 …, 2004 | 62 | 2004 |
A framework for efficient adaptively secure composable oblivious transfer in the ROM PSLM Barreto, B David, R Dowsley, K Morozov, ACA Nascimento arXiv preprint arXiv:1710.08256, 2017 | 42 | 2017 |
On the oblivious transfer capacity of the erasure channel H Imai, K Morozov, ACA Nascimento 2006 IEEE International Symposium on Information Theory, 1428-1431, 2006 | 36 | 2006 |
Efficient protocols achieving the commitment capacity of noisy correlations H Imai, K Morozov, ACA Nascimento, A Winter 2006 IEEE International Symposium on Information Theory, 1432-1436, 2006 | 32 | 2006 |
On the possibility of key agreement using variable directional antenna H Imai12, K Kobara21, K Morozov21 | 32 | 2006 |
Achieving oblivious transfer capacity of generalized erasure channels in the malicious model ACB Pinto, R Dowsley, K Morozov, ACA Nascimento IEEE Transactions on Information Theory 57 (8), 5566-5571, 2011 | 28 | 2011 |
An efficient robust secret sharing scheme with optimal cheater resiliency PS Roy, A Adhikari, R Xu, K Morozov, K Sakurai Security, Privacy, and Applied Cryptography Engineering: 4th International …, 2014 | 24 | 2014 |
Efficient threshold secret sharing schemes secure against rushing cheaters A Adhikari, K Morozov, S Obana, PS Roy, K Sakurai, R Xu International conference on information theoretic security, 3-23, 2016 | 23 | 2016 |
Coding-based oblivious transfer K Kobara, K Morozov, R Overbeck Mathematical Methods in Computer Science: Essays in Memory of Thomas Beth …, 2008 | 22 | 2008 |
Efficient outsourcing of secure k-nearest neighbour query over encrypted database R Xu, K Morozov, Y Yang, J Zhou, T Takagi Computers & Security 69, 65-83, 2017 | 21 | 2017 |
On cheater identifiable secret sharing schemes secure against rushing adversary R Xu, K Morozov, T Takagi Advances in Information and Computer Security: 8th International Workshop on …, 2013 | 18 | 2013 |
Parity check based redistribution of secret shares Y Desmedt, K Morozov 2015 IEEE International Symposium on Information Theory (ISIT), 959-963, 2015 | 17 | 2015 |
Cheater identifiable secret sharing schemes via multi-receiver authentication R Xu, K Morozov, T Takagi Advances in Information and Computer Security: 9th International Workshop on …, 2014 | 17 | 2014 |
Generalized oblivious transfer protocols based on noisy channels V Korjik, K Morozov Information Assurance in Computer Networks: Methods, Models and …, 2001 | 17 | 2001 |
Zero-knowledge protocols for the McEliece encryption K Morozov, T Takagi Australasian Conference on Information Security and Privacy, 180-193, 2012 | 15 | 2012 |
Multi-tier reputation for data cooperatives A Salau, R Dantu, K Morozov, K Upadhyay, S Badruddoja The International Conference on Mathematical Research for Blockchain Economy …, 2022 | 13 | 2022 |
Towards a Threat Model and Security Analysis for Data Cooperatives. A Salau, R Dantu, K Morozov, K Upadhyay, S Badruddoja SECRYPT, 707-713, 2022 | 13 | 2022 |