Follow
Kirill Morozov
Kirill Morozov
Verified email at unt.edu - Homepage
Title
Cited by
Cited by
Year
Semantic security for the McEliece cryptosystem without random oracles
R Nojima, H Imai, K Kobara, K Morozov
Designs, Codes and Cryptography 49, 289-305, 2008
1502008
Efficient unconditional oblivious transfer from almost any noisy channel
C Crépeau, K Morozov, S Wolf
Security in Communication Networks: 4th International Conference, SCN 2004 …, 2005
1252005
A decentralized marketplace application on the ethereum blockchain
VP Ranganthan, R Dantu, A Paul, P Mears, K Morozov
2018 IEEE 4th International Conference on Collaboration and Internet …, 2018
1142018
Unfair noisy channels and oblivious transfer
I Damgård, S Fehr, K Morozov, L Salvail
Theory of Cryptography: First Theory of Cryptography Conference, TCC 2004 …, 2004
612004
A framework for efficient adaptively secure composable oblivious transfer in the ROM
PSLM Barreto, B David, R Dowsley, K Morozov, ACA Nascimento
arXiv preprint arXiv:1710.08256, 2017
402017
On the oblivious transfer capacity of the erasure channel
H Imai, K Morozov, ACA Nascimento
2006 IEEE International Symposium on Information Theory, 1428-1431, 2006
352006
On the possibility of key agreement using variable directional antenna
H Imai12, K Kobara21, K Morozov21
322006
Efficient protocols achieving the commitment capacity of noisy correlations
H Imai, K Morozov, ACA Nascimento, A Winter
2006 IEEE International Symposium on Information Theory, 1432-1436, 2006
302006
Achieving oblivious transfer capacity of generalized erasure channels in the malicious model
ACB Pinto, R Dowsley, K Morozov, ACA Nascimento
IEEE Transactions on Information Theory 57 (8), 5566-5571, 2011
282011
An efficient robust secret sharing scheme with optimal cheater resiliency
PS Roy, A Adhikari, R Xu, K Morozov, K Sakurai
Security, Privacy, and Applied Cryptography Engineering: 4th International …, 2014
242014
Efficient threshold secret sharing schemes secure against rushing cheaters
A Adhikari, K Morozov, S Obana, PS Roy, K Sakurai, R Xu
International conference on information theoretic security, 3-23, 2016
232016
Coding-based oblivious transfer
K Kobara, K Morozov, R Overbeck
Mathematical Methods in Computer Science: Essays in Memory of Thomas Beth …, 2008
222008
Efficient outsourcing of secure k-nearest neighbour query over encrypted database
R Xu, K Morozov, Y Yang, J Zhou, T Takagi
Computers & Security 69, 65-83, 2017
212017
On cheater identifiable secret sharing schemes secure against rushing adversary
R Xu, K Morozov, T Takagi
Advances in Information and Computer Security: 8th International Workshop on …, 2013
182013
Cheater identifiable secret sharing schemes via multi-receiver authentication
R Xu, K Morozov, T Takagi
Advances in Information and Computer Security: 9th International Workshop on …, 2014
172014
Generalized oblivious transfer protocols based on noisy channels
V Korjik, K Morozov
Information Assurance in Computer Networks: Methods, Models and …, 2001
172001
Parity check based redistribution of secret shares
Y Desmedt, K Morozov
2015 IEEE International Symposium on Information Theory (ISIT), 959-963, 2015
162015
Zero-knowledge protocols for the McEliece encryption
K Morozov, T Takagi
Australasian Conference on Information Security and Privacy, 180-193, 2012
152012
Towards a Threat Model and Security Analysis for Data Cooperatives.
A Salau, R Dantu, K Morozov, K Upadhyay, S Badruddoja
SECRYPT, 707-713, 2022
132022
Multi-tier reputation for data cooperatives
A Salau, R Dantu, K Morozov, K Upadhyay, S Badruddoja
The International Conference on Mathematical Research for Blockchain Economy …, 2022
112022
The system can't perform the operation now. Try again later.
Articles 1–20