default search action
Sophia Yakoubov
Person information
- affiliation: Aarhus University, Denmark
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j3]Sebastian Kolby, Elena Pagnin, Sophia Yakoubov:
Multi Designated Verifier Ring Signatures. IACR Commun. Cryptol. 1(3): 28 (2024) - [j2]Sebastian Kolby, Divya Ravi, Sophia Yakoubov:
Constant-Round YOSO MPC Without Setup. IACR Commun. Cryptol. 1(3): 30 (2024) - [i28]Ivan Damgård, Divya Ravi, Lawrence Roy, Daniel Tschudi, Sophia Yakoubov:
Efficient Secure Communication Over Dynamic Incomplete Networks With Minimal Connectivity. IACR Cryptol. ePrint Arch. 2024: 972 (2024) - 2023
- [c26]Ivan Damgård, Divya Ravi, Daniel Tschudi, Sophia Yakoubov:
Secure Communication in Dynamic Incomplete Networks. ITC 2023: 13:1-13:21 - [c25]Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov:
Minimizing Setup in Broadcast-Optimal Two Round MPC. EUROCRYPT (2) 2023: 129-158 - [c24]Nikolas Melissaris, Divya Ravi, Sophia Yakoubov:
Threshold-Optimal MPC with Friends and Foes. INDOCRYPT (2) 2023: 3-24 - [c23]Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov:
Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-Peer Channels. LATINCRYPT 2023: 87-106 - [c22]Michele Ciampi, Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Yu Xia, Sophia Yakoubov:
Broadcast-Optimal Four-Round MPC in the Plain Model. TCC (2) 2023: 3-32 - [c21]Ran Canetti, Sebastian Kolby, Divya Ravi, Eduardo Soria-Vazquez, Sophia Yakoubov:
Taming Adaptivity in YOSO Protocols: The Modular Way. TCC (2) 2023: 33-62 - [i27]Ivan Damgård, Divya Ravi, Daniel Tschudi, Sophia Yakoubov:
Secure Communication in Dynamic Incomplete Networks. IACR Cryptol. ePrint Arch. 2023: 529 (2023) - [i26]Ran Canetti, Sebastian Kolby, Divya Ravi, Eduardo Soria-Vazquez, Sophia Yakoubov:
Taming Adaptivity in YOSO Protocols: The Modular Way. IACR Cryptol. ePrint Arch. 2023: 1077 (2023) - [i25]Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov:
Broadcast-Optimal Two Round MPC with Asynchronous Peer-to-Peer Channels. IACR Cryptol. ePrint Arch. 2023: 1187 (2023) - [i24]Michele Ciampi, Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Yu Xia, Sophia Yakoubov:
Broadcast-Optimal Four-Round MPC in the Plain Model. IACR Cryptol. ePrint Arch. 2023: 1739 (2023) - 2022
- [c20]Damiano Abram, Peter Scholl, Sophia Yakoubov:
Distributed (Correlation) Samplers: How to Remove a Trusted Dealer in One Round. EUROCRYPT (1) 2022: 790-820 - [c19]Diego F. Aranha, Mathias Hall-Andersen, Anca Nitulescu, Elena Pagnin, Sophia Yakoubov:
Count Me In! Extendability for Threshold Ring Signatures. Public Key Cryptography (2) 2022: 379-406 - [c18]Diego F. Aranha, Felix Engelmann, Sebastian Kolby, Sophia Yakoubov:
The State of the Union: Union-Only Signatures for Data Aggregation. SCN 2022: 387-410 - [c17]Mark Simkin, Luisa Siniscalchi, Sophia Yakoubov:
On Sufficient Oracles for Secure Computation with Identifiable Abort. SCN 2022: 494-515 - [i23]Sebastian Kolby, Divya Ravi, Sophia Yakoubov:
Towards Efficient YOSO MPC Without Setup. IACR Cryptol. ePrint Arch. 2022: 187 (2022) - [i22]Ivan Damgård, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov:
Minimizing Setup in Broadcast-Optimal Two Round MPC. IACR Cryptol. ePrint Arch. 2022: 293 (2022) - [i21]Damiano Abram, Peter Scholl, Sophia Yakoubov:
Distributed (Correlation) Samplers: How to Remove a Trusted Dealer in One Round. IACR Cryptol. ePrint Arch. 2022: 535 (2022) - [i20]Diego F. Aranha, Felix Engelmann, Sebastian Kolby, Sophia Yakoubov:
The State of the Union: Union-Only Signatures for Data Aggregation. IACR Cryptol. ePrint Arch. 2022: 867 (2022) - [i19]Nikolas Melissaris, Divya Ravi, Sophia Yakoubov:
Threshold-Optimal MPC With Friends and Foes. IACR Cryptol. ePrint Arch. 2022: 1526 (2022) - 2021
- [c16]Ivan Bjerre Damgård, Kasper Green Larsen, Sophia Yakoubov:
Broadcast Secret-Sharing, Bounds and Applications. ITC 2021: 10:1-10:20 - [c15]Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov:
YOSO: You Only Speak Once - Secure MPC with Stateless Ephemeral Roles. CRYPTO (2) 2021: 64-93 - [c14]Ivan Damgård, Bernardo Magri, Divya Ravi, Luisa Siniscalchi, Sophia Yakoubov:
Broadcast-Optimal Two Round MPC with an Honest Majority. CRYPTO (2) 2021: 155-184 - [c13]Leonid Reyzin, Adam D. Smith, Sophia Yakoubov:
Turning HATE into LOVE: Compact Homomorphic Ad Hoc Threshold Encryption for Scalable MPC. CSCML 2021: 361-378 - [c12]Claudio Orlandi, Peter Scholl, Sophia Yakoubov:
The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT. EUROCRYPT (1) 2021: 678-708 - [c11]Alexander Munch-Hansen, Claudio Orlandi, Sophia Yakoubov:
Stronger Notions and a More Efficient Construction of Threshold Ring Signatures. LATINCRYPT 2021: 363-381 - [c10]Craig Gentry, Shai Halevi, Bernardo Magri, Jesper Buus Nielsen, Sophia Yakoubov:
Random-Index PIR and Applications. TCC (3) 2021: 32-61 - [i18]Mark Simkin, Luisa Siniscalchi, Sophia Yakoubov:
On Sufficient Oracles for Secure Computation with Identifiable Abort. IACR Cryptol. ePrint Arch. 2021: 151 (2021) - [i17]Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, Sophia Yakoubov:
YOSO: You Only Speak Once / Secure MPC with Stateless Ephemeral Roles. IACR Cryptol. ePrint Arch. 2021: 210 (2021) - [i16]Claudio Orlandi, Peter Scholl, Sophia Yakoubov:
The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT. IACR Cryptol. ePrint Arch. 2021: 262 (2021) - [i15]Diego F. Aranha, Mathias Hall-Andersen, Anca Nitulescu, Elena Pagnin, Sophia Yakoubov:
Count Me In! Extendability for Threshold Ring Signatures. IACR Cryptol. ePrint Arch. 2021: 1240 (2021) - 2020
- [b1]Sophia Yakoubov:
Studies in authentication. Boston University, USA, 2020 - [c9]Foteini Baldimtsi, Ran Canetti, Sophia Yakoubov:
Universally Composable Accumulators. CT-RSA 2020: 638-666 - [c8]Ivan Damgård, Helene Haagh, Rebekah Mercer, Anca Nitulescu, Claudio Orlandi, Sophia Yakoubov:
Stronger Security and Constructions of Multi-designated Verifier Signatures. TCC (2) 2020: 229-260 - [i14]Ivan Damgård, Sophia Yakoubov:
Bounds on Ad Hoc Threshold Encryption. IACR Cryptol. ePrint Arch. 2020: 618 (2020) - [i13]Alexander Munch-Hansen, Claudio Orlandi, Sophia Yakoubov:
Stronger Notions and a More Efficient Construction of Threshold Ring Signatures. IACR Cryptol. ePrint Arch. 2020: 678 (2020) - [i12]Craig Gentry, Shai Halevi, Bernardo Magri, Jesper Buus Nielsen, Sophia Yakoubov:
Random-index PIR with Applications to Large-Scale Secure MPC. IACR Cryptol. ePrint Arch. 2020: 1248 (2020) - [i11]Ivan Damgård, Bernardo Magri, Luisa Siniscalchi, Sophia Yakoubov:
Broadcast-Optimal Two Round MPC with an Honest Majority. IACR Cryptol. ePrint Arch. 2020: 1254 (2020)
2010 – 2019
- 2019
- [i10]Ivan Damgård, Helene Haagh, Rebekah Mercer, Anca Nitulescu, Claudio Orlandi, Sophia Yakoubov:
Stronger Notions and Constructions for Multi-Designated Verifier Signatures. IACR Cryptol. ePrint Arch. 2019: 1153 (2019) - 2018
- [c7]Pierre-Alain Dupont, Julia Hesse, David Pointcheval, Leonid Reyzin, Sophia Yakoubov:
Fuzzy Password-Authenticated Key Exchange. EUROCRYPT (3) 2018: 393-424 - [i9]Leonid Reyzin, Adam D. Smith, Sophia Yakoubov:
Turning HATE Into LOVE: Homomorphic Ad Hoc Threshold Encryption for Scalable MPC. IACR Cryptol. ePrint Arch. 2018: 997 (2018) - [i8]Foteini Baldimtsi, Ran Canetti, Sophia Yakoubov:
Universally Composable Accumulators. IACR Cryptol. ePrint Arch. 2018: 1241 (2018) - 2017
- [c6]Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov:
Accumulators with Applications to Anonymity-Preserving Revocation. EuroS&P 2017: 301-315 - [c5]Robert K. Cunningham, Benjamin Fuller, Sophia Yakoubov:
Catching MPC Cheaters: Identification and Openability. ICITS 2017: 110-134 - [i7]Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov:
Accumulators with Applications to Anonymity-Preserving Revocation. IACR Cryptol. ePrint Arch. 2017: 43 (2017) - [i6]Pierre-Alain Dupont, Julia Hesse, David Pointcheval, Leonid Reyzin, Sophia Yakoubov:
Fuzzy Authenticated Key Exchange. IACR Cryptol. ePrint Arch. 2017: 1111 (2017) - 2016
- [c4]Leonid Reyzin, Sophia Yakoubov:
Efficient Asynchronous Accumulators for Distributed PKI. SCN 2016: 292-309 - [c3]Kyle Hogan, Noah Luther, Nabil Schear, Emily Shen, David Stott, Sophia Yakoubov, Arkady Yerukhimovich:
Secure Multiparty Computation for Cooperative Cyber Risk Assessment. SecDev 2016: 75-76 - [i5]Ariel Hamlin, Nabil Schear, Emily Shen, Mayank Varia, Sophia Yakoubov, Arkady Yerukhimovich:
Cryptography for Big Data Security. IACR Cryptol. ePrint Arch. 2016: 12 (2016) - [i4]Robert K. Cunningham, Benjamin Fuller, Sophia Yakoubov:
Catching MPC Cheaters: Identification and Openability. IACR Cryptol. ePrint Arch. 2016: 611 (2016) - 2015
- [j1]Mayank Varia, Benjamin Price, Nicholas Hwang, Ariel Hamlin, Jonathan Herzog, Jill Poland, Michael Reschly, Sophia Yakoubov, Robert K. Cunningham:
Automated Assessment of Secure Search Systems. ACM SIGOPS Oper. Syst. Rev. 49(1): 22-30 (2015) - [c2]Mayank Varia, Sophia Yakoubov, Yang Yang:
HEtest: A Homomorphic Encryption Testing Framework. Financial Cryptography Workshops 2015: 213-230 - [i3]Mayank Varia, Sophia Yakoubov, Yang Yang:
HETest: A Homomorphic Encryption Testing Framework. IACR Cryptol. ePrint Arch. 2015: 416 (2015) - [i2]Leonid Reyzin, Sophia Yakoubov:
Efficient Asynchronous Accumulators for Distributed PKI. IACR Cryptol. ePrint Arch. 2015: 718 (2015) - 2014
- [c1]Sophia Yakoubov, Vijay Gadepally, Nabil Schear, Emily Shen, Arkady Yerukhimovich:
A survey of cryptographic approaches to securing big-data analytics in the cloud. HPEC 2014: 1-6 - [i1]Conner Fromknecht, Dragos Velicanu, Sophia Yakoubov:
A Decentralized Public Key Infrastructure with Identity Retention. IACR Cryptol. ePrint Arch. 2014: 803 (2014)
Coauthor Index
aka: Ivan Bjerre Damgård
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint