Ilya Mironov
Ilya Mironov
Facebook AI
Verified email at - Homepage
Cited by
Cited by
Deep learning with differential privacy
M Abadi, A Chu, I Goodfellow, HB McMahan, I Mironov, K Talwar, L Zhang
Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016
Our data, ourselves: Privacy via distributed noise generation
C Dwork, K Kenthapadi, F McSherry, I Mironov, M Naor
Annual International Conference on the Theory and Applications of …, 2006
Incentives for sharing in peer-to-peer networks
P Golle, K Leyton-Brown, I Mironov
Proceedings of the 3rd ACM conference on Electronic Commerce (EC 2001), 264-267, 2001
Differentially private recommender systems: building privacy into the Netflix Prize contenders
F McSherry, I Mironov
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
Renyi differential privacy
I Mironov
2017 IEEE 30th Computer Security Foundations Symposium (CSF), 263-275, 2017
Cache-collision timing attacks against AES
J Bonneau, I Mironov
Cryptographic Hardware and Embedded Systems---CHES 2006, 201-215, 2006
Frodo: Take off the ring! practical, quantum-secure key exchange from LWE
J Bos, C Costello, L Ducas, I Mironov, M Naehrig, V Nikolaenko, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
Uncheatable distributed computations
P Golle, I Mironov
Topics in Cryptology---CT-RSA 2001, 425-440, 2001
Scalable Private Learning with PATE
N Papernot, S Song, I Mironov, A Raghunathan, K Talwar, Ú Erlingsson
International Conference on Learning Representations (ICLR), 2018
Computational differential privacy
I Mironov, O Pandey, O Reingold, S Vadhan
Advances in Cryptology---CRYPTO 2009, 126-142, 2009
Applications of SAT solvers to cryptanalysis of hash functions
I Mironov, L Zhang
Theory and Applications of Satisfiability Testing---SAT 2006, 102-115, 2006
PROCHLO: Strong privacy for analytics in the crowd
A Bittau, Ú Erlingsson, P Maniatis, I Mironov, A Raghunathan, D Lie, ...
Proceedings of the 26th Symposium on Operating Systems Principles (SOSP …, 2017
The limits of two-party differential privacy
A McGregor, I Mironov, T Pitassi, O Reingold, K Talwar, S Vadhan
51st Annual IEEE Symposium on Foundations of Computer Science (FOCS), 81-90, 2010
(Not so) random shuffles of RC4
I Mironov
Advances in Cryptology---CRYPTO 2002, 304-319, 2002
Amplification by shuffling: From local to central differential privacy via anonymity
Ú Erlingsson, V Feldman, I Mironov, A Raghunathan, K Talwar, ...
Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete …, 2019
Cryptographic primitives enforcing communication and storage complexity
P Golle, S Jarecki, I Mironov
International Conference on Financial Cryptography, 120-135, 2002
Message-locked encryption for lock-dependent messages
M Abadi, D Boneh, I Mironov, A Raghunathan, G Segev
Advances in Cryptology---CRYPTO 2013, 374-391, 2013
On significance of the least significant bits for differential privacy
I Mironov
Proceedings of the 2012 ACM Conference on Computer and Communications …, 2012
Hash functions: Theory, attacks, and applications
I Mironov
Microsoft Research, 2005
Privacy via the Johnson-Lindenstrauss Transform
K Kenthapadi, A Korolova, I Mironov, N Mishra
Journal of Privacy and Confidentiality 5 (1), 2013
The system can't perform the operation now. Try again later.
Articles 1–20