Valeria Nikolaenko
Valeria Nikolaenko
PhD Student, Stanford University
Verified email at
Cited by
Cited by
Privacy-preserving ridge regression on hundreds of millions of records
V Nikolaenko, U Weinsberg, S Ioannidis, M Joye, D Boneh, N Taft
2013 IEEE symposium on security and privacy, 334-348, 2013
Frodo: Take off the ring! practical, quantum-secure key exchange from LWE
J Bos, C Costello, L Ducas, I Mironov, M Naehrig, V Nikolaenko, ...
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits
D Boneh, C Gentry, S Gorbunov, S Halevi, V Nikolaenko, G Segev, ...
Advances in Cryptology–EUROCRYPT 2014: 33rd Annual International Conference …, 2014
Privacy-preserving matrix factorization
V Nikolaenko, S Ioannidis, U Weinsberg, M Joye, N Taft, D Boneh
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
M Naehrig, E Alkim, J Bos, L Ducas, K Easterbrook, B LaMacchia, ...
Technical report, National Institute of Standards and Technology, 2017
FrodoKEM learning with errors key encapsulation
E Alkim, JW Bos, L Ducas, P Longa, I Mironov, M Naehrig, V Nikolaenko, ...
NIST PQC standardization: Round 3, 2020
A method and system for privacy preserving matrix factorization
E Ioannidis, E Weinsberg, NA Taft, M Joye, V Nikolaenko
US Patent App. 14/771,534, 2016
FrodoKEM: Learning With Errors Key Encapsulation–Algorithm Specifications And Supporting Documentation
M Naehrig, E Alkim, J Bos, L Ducas, K Easterbrook, B LaMacchia, ...
NIST Technical Report, 2019
Taming the many EdDSAs
K Chalkias, F Garillot, V Nikolaenko
Security Standardisation Research: 6th International Conference, SSR 2020 …, 2020
Lattice-based DAPS and generalizations: Self-enforcement in signature schemes
D Boneh, S Kim, V Nikolaenko
Applied Cryptography and Network Security: 15th International Conference …, 2017
Attribute-based encryption for arithmetic circuits
D Boneh, V Nikolaenko, G Segev
Cryptology ePrint Archive, 2013
Winkle: Foiling long-range attacks in proof-of-stake systems
S Azouvi, G Danezis, V Nikolaenko
Proceedings of the 2nd ACM Conference on Advances in Financial Technologies …, 2020
Frodokem–learning with errors key encapsulation, 2017
E Alkim, J Bos, L Ducas, P Longa, I Mironov, M Naehrig, V Nikolaenko, ...
URL: https://frodokem. org/files/FrodoKEM-specification-20171130. pdf, 2018
Threshold schnorr with stateless deterministic signing from standard assumptions
F Garillot, Y Kondi, P Mohassel, V Nikolaenko
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
Distributed auditing proofs of liabilities
K Chalkias, K Lewi, P Mohassel, V Nikolaenko
Cryptology ePrint Archive, 2020
Privacy-preserving ridge regression using masks
V Nikolaenko, U Weinsberg, S Ioannidis, M Joye, N Taft
US Patent App. 14/767,569, 2015
Non-interactive half-aggregation of EdDSA and variants of Schnorr signatures
K Chalkias, F Garillot, Y Kondi, V Nikolaenko
Topics in Cryptology–CT-RSA 2021: Cryptographers’ Track at the RSA …, 2021
Privacy-preserving ridge regression using partially homomorphic encryption and masks
V Nikolaenko, U Weinsberg, S Ioannidis, M Joye, N Taft
US Patent App. 14/767,568, 2016
Homomorphic decryption in blockchains via compressed discrete-log lookup tables
P Chatzigiannis, K Chalkias, V Nikolaenko
Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS …, 2022
Accountable cryptographic access control
JA Kroll, J Zimmerman, DJ Wu, V Nikolaenko, EW Felten, D Boneh
Workshop, CRYPTO, 2018
The system can't perform the operation now. Try again later.
Articles 1–20