A
Anton Mityagin
Researcher at Microsoft
Publications - 40
Citations - 1431
Anton Mityagin is an academic researcher from Microsoft. The author has contributed to research in topics: Authenticated Key Exchange & Key (cryptography). The author has an hindex of 17, co-authored 40 publications receiving 1345 citations. Previous affiliations of Anton Mityagin include University of California, San Diego & University of California, Los Angeles.
Papers
More filters
Posted Content
Hard Instances of the Constrained Discrete Logarithm Problem.
TL;DR: In this article, the complexity of generic algorithms for solving the constrained discrete logarithm problem depends on the choice of the set and can be improved by using geometric tools such as generalized Menelaus' theorem for proving lower bounds.
Book ChapterDOI
Hard Instances of the Constrained Discrete Logarithm Problem
TL;DR: In this article, the complexity of generic algorithms for solving the constrained discrete logarithm problem depends on the choice of the set and can be improved by using geometric tools such as generalized Menelaus' theorem for proving lower bounds.
Proceedings Article
Proceedings of the ACM SIGKDD Workshop on Human Computation
Paul N. Bennett,Raman Chandrasekar,Max Chickering,Panos Ipeirotis,Edith Law,Anton Mityagin,Foster Provost,Luis von Ahn +7 more
TL;DR: The Human Computation Workshop (HCOMP 2009) as discussed by the authors was the first workshop bringing together academic and industry researchers to discuss existing human computation applications and future directions of this new subject area.
Collecting High Quality Overlapping Labels at
TL;DR: The paper explores whether, when, and for which should obtain overlapping training labels, as well as labels per sample are needed, and presents a study of how many overlapping labels are needed to get the best in retrieval accuracy.
Posted Content
Security Analysis of KEA Authenticated Key Exchange Protocol.
Kristin E. Lauter,Anton Mityagin +1 more
TL;DR: In this article, a modified version of KEA, called KEA+ satisfies the strongest security requirements for authenticated key exchange and retains some security even if a secret key of a party is leaked.