1997
Advances and impact of secure function evaluation

Vladimir Kolesnikov
Bell Labs Technical Journal 14 ( 3) 187 -192

11
2009
Swarming secrets

Shlomi Dolev , Niv Gilboa , Juan Garay , Vladimir Kolesnikov
allerton conference on communication, control, and computing 1438 -1445

16
2009
Secure Computation with Sublinear Amortized Work.

Yevgeniy Vahlis , S. Dov Gordon , Tal Malkin , Jonathan Katz
IACR Cryptology ePrint Archive 2011 482

9
2011
From Dust to Dawn: Practically Efficient Two-Party Secure Function Evaluation Protocols and their Modular Design.

Ahmad-Reza Sadeghi , Thomas Schneider , Vladimir Kolesnikov
IACR Cryptology ePrint Archive 2010 79

27
2010
IBAKE: Identity-Based Authenticated Key Exchange Protocol.

Vladimir Kolesnikov , Ganapathy S. Sundaram
IACR Cryptology ePrint Archive 2011 612

7
2011
Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version).

Ahmad-Reza Sadeghi , Thomas Schneider , Kimmo Järvinen , Vladimir Kolesnikov
cryptographic hardware and embedded systems 383 -397

1
2010
Gate evaluation secret sharing and secure one-round two-party computation

Vladimir Kolesnikov
Lecture Notes in Computer Science 136 -155

67
2005
Strong conditional Oblivious Transfer and computing on intervals

Ian F. Blake , Vladimir Kolesnikov
Lecture Notes in Computer Science 515 -529

2004
Proving Anything Quickly, Privately, and Elegantly with Secure Computation

Vladimir Kolesnikov
Georgia Institute of Technology

2018
A Pragmatic Introduction to Secure Multi-Party Computation

Mike Rosulek , Vladimir Kolesnikov , David Evans

255
2019
Efficient Batched Oblivious PRF with Applications to Private Set Intersection.

Mike Rosulek , Ranjit Kumaresan , Vladimir Kolesnikov , Ni Trieu
IACR Cryptology ePrint Archive 2016 799

244
2016
A Security Enhancement and Proof for Authentication and Key Agreement (AKA).

Vladimir Kolesnikov
IACR Cryptology ePrint Archive 2010 350

2010
Secure Key Exchange and Sessions Without Credentials.

Yevgeniy Vahlis , Ran Canetti , Charles Rackoff , Vladimir Kolesnikov
IACR Cryptology ePrint Archive 2013 693

2013
1
2018
Improved Non-Interactive Zero Knowledge with Applications to Post-Quantum Signatures.

Jonathan Katz , Vladimir Kolesnikov , Xiao Wang
IACR Cryptology ePrint Archive 2018 475

2
2018
Scalable Private Set Union from Symmetric-Key Techniques.

Mike Rosulek , Vladimir Kolesnikov , Ni Trieu , Xiao Wang
IACR Cryptology ePrint Archive 2019 776

2019
Overlaying Circuit Clauses for Secure Computation.

Gordon T. Wilfong , W. Sean Kennedy , Vladimir Kolesnikov
IACR Cryptology ePrint Archive 2016 685

6
2016
Stacked Garbling for Disjunctive Zero-Knowledge Proofs.

Vladimir Kolesnikov , David Heath
IACR Cryptology ePrint Archive 2020 136

49
2020