


default search action
Stanislav Kruglik
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j8]Stanislav Kruglik
, Han Mao Kiah
, Son Hoang Dau
, Eitan Yaakobi
:
Recovering Reed-Solomon Codes Privately. IEEE Trans. Inf. Forensics Secur. 20: 2807-2821 (2025) - 2024
- [j7]Yatipa Chaleenutthawut, Vyacheslav Davydov
, Michael Evdokimov, Sudarut Kasemsuk
, Stanislav Kruglik
, Grigorii Melnikov, Yury Yanovich
:
Loan Portfolio Dataset From MakerDAO Blockchain Project. IEEE Access 12: 24843-24854 (2024) - [j6]Wilton Kim
, Stanislav Kruglik
, Han Mao Kiah
:
Verifiable Coded Computation of Multiple Functions. IEEE Trans. Inf. Forensics Secur. 19: 8009-8022 (2024) - [j5]Stanislav Kruglik
, Son Hoang Dau
, Han Mao Kiah
, Huaxiong Wang
, Liang Feng Zhang
:
Querying Twice to Achieve Information-Theoretic Verifiability in Private Information Retrieval. IEEE Trans. Inf. Forensics Secur. 19: 8172-8187 (2024) - [j4]Han Mao Kiah
, Wilton Kim
, Stanislav Kruglik
, San Ling
, Huaxiong Wang
:
Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded Symbols. IEEE Trans. Inf. Theory 70(8): 5552-5565 (2024) - [c24]Wilton Kim, Joel Nathanael Raj, Stanislav Kruglik, Han Mao Kiah:
Decoding Sparse Reed-Solomon Codes with Known Support. ISIT 2024: 1029-1034 - [c23]Dinh Thi Xinh, Ba Thong Le, Son Hoang Dau, Serdar Boztas, Stanislav Kruglik, Han Mao Kiah, Emanuele Viterbo, Tuvi Etzion, Yeow Meng Chee:
Repairing a Single Erasure in Reed-Solomon Codes with Side Information. ISIT 2024: 2122-2127 - [c22]Stanislav Kruglik, Han Mao Kiah, Son Hoang Dau, Eitan Yaakobi:
Private Repair of a Single Erasure in Reed-Solomon Codes. ISIT 2024: 2640-2645 - [i13]Stanislav Kruglik, Han Mao Kiah, Son Hoang Dau, Eitan Yaakobi:
Private Repair of a Single Erasure in Reed-Solomon Codes. CoRR abs/2405.06583 (2024) - [i12]Dinh Thi Xinh, Ba Thong Le, Son Hoang Dau, Serdar Boztas, Stanislav Kruglik, Han Mao Kiah, Emanuele Viterbo, Tuvi Etzion, Yeow Meng Chee:
Repairing Reed-Solomon Codes with Side Information. CoRR abs/2405.07180 (2024) - [i11]Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang, Liang Feng Zhang:
Verifiable Information-Theoretic Function Secret Sharing. IACR Cryptol. ePrint Arch. 2024: 453 (2024) - 2023
- [c21]Quang Cao
, Hong-Yen Tran, Son Hoang Dau, Xun Yi, Emanuele Viterbo, Chen Feng, Yu-Chih Huang
, Jingge Zhu, Stanislav Kruglik
, Han Mao Kiah:
Committed Private Information Retrieval. ESORICS (1) 2023: 393-413 - [c20]Stanislav Kruglik
, Gaojun Luo, Wilton Kim, Shubhransh Singhvi, Han Mao Kiah, San Ling
, Huaxiong Wang:
Repair of Reed-Solomon Codes in the Presence of Erroneous Nodes. ISIT 2023: 1003-1008 - [c19]Stanislav Kruglik
, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang:
Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification. ISIT 2023: 1354-1359 - [c18]Stanislav Kruglik
, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang:
k-server Byzantine-Resistant PIR Scheme with Optimal Download Rate and Optimal File Size. ISIT 2023: 1532-1537 - [c17]Han Mao Kiah, Wilton Kim, Stanislav Kruglik
, San Ling
, Huaxiong Wang:
Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded Symbols. ISIT 2023: 1973-1978 - [c16]Wilton Kim, Stanislav Kruglik
, Han Mao Kiah:
Coded Computation of Multiple Functions. ITW 2023: 468-473 - [i10]Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang:
Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification. CoRR abs/2301.11730 (2023) - [i9]Quang Cao
, Hong-Yen Tran, Son Hoang Dau, Xun Yi, Emanuele Viterbo, Chen Feng, Yu-Chih Huang, Jingge Zhu, Stanislav Kruglik, Han Mao Kiah:
Committed Private Information Retrieval. CoRR abs/2302.01733 (2023) - [i8]Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang:
k-server Byzantine-Resistant PIR Scheme with Optimal Download Rate and Optimal File Size. CoRR abs/2302.02230 (2023) - [i7]Stanislav Kruglik, Gaojun Luo, Wilton Kim, Shubhransh Singhvi, Han Mao Kiah, San Ling, Huaxiong Wang:
Repair of Reed-Solomon Codes in the Presence of Erroneous Nodes. CoRR abs/2305.03442 (2023) - 2022
- [i6]Han Mao Kiah, Wilton Kim, Stanislav Kruglik, San Ling, Huaxiong Wang:
Explicit Low-Bandwidth Evaluation Schemes for Weighted Sums of Reed-Solomon-Coded Symbols. CoRR abs/2209.03251 (2022) - [i5]Wilton Kim, Stanislav Kruglik, Han Mao Kiah:
Coded Computation of Multiple Functions. CoRR abs/2212.07091 (2022) - 2021
- [j3]Vyacheslav Davydov, Stanislav Kruglik
, Yury Yanovich
:
Comparison of Banking and Peer-to-Peer Lending Risks. Autom. Remote. Control. 82(12): 2155-2168 (2021) - [j2]Lukas Holzbaur
, Stanislav Kruglik
, Alexey A. Frolov
, Antonia Wachter-Zeh
:
Secure Codes With Accessibility for Distributed Storage. IEEE Trans. Inf. Forensics Secur. 16: 5326-5337 (2021) - 2020
- [c15]Lukas Holzbaur, Stanislav Kruglik
, Alexey A. Frolov, Antonia Wachter-Zeh:
Secrecy and Accessibility in Distributed Storage. GLOBECOM 2020: 1-6 - [c14]Kamilla Nazirkhanova, Luiza R. Medova, Stanislav Kruglik, Alexey A. Frolov:
Codes Correcting Bounded Length Tandem Duplication. ISITA 2020: 299-303 - [c13]Stanislav Kruglik
:
Secure MBR Array Codes in the Presence of Special Type Eavesdropper. NEW2AN/ruSMART (2) 2020: 56-66 - [c12]Stanislav Kruglik
:
Security Issues in Distributed Storage Networks. WoWMoM 2020: 62-63 - [c11]Sergey Kudryashov, Stanislav Kruglik
, Ivan Maslov, Yury Yanovich
:
Supply-Chain Management System for Plastic Pipes Market Based on Open Blockchain Framework. WoWMoM 2020: 188-190 - [i4]Lukas Holzbaur, Stanislav Kruglik, Alexey A. Frolov, Antonia Wachter-Zeh:
Secrecy and Accessibility in Distributed Storage. CoRR abs/2001.05337 (2020)
2010 – 2019
- 2019
- [j1]Stanislav Kruglik
, Kamilla Nazirkhanova
, Alexey A. Frolov
:
New Bounds and Generalizations of Locally Recoverable Codes With Availability. IEEE Trans. Inf. Theory 65(7): 4156-4166 (2019) - [c10]Darya Korepanova, Stanislav Kruglik
, Yash Madhwal, Timur Myaldzin, Ivan Prokhorov, Igor Shiyanov, Sergey Vorobyov, Yury Yanovich
:
Blockchain-Based Solution to Prevent Postage Stamps Fraud. IEEE ICBC 2019: 171-175 - [c9]Andrey Ivanov, Maria Stoliarenko, Stanislav Kruglik
, Serafim Novichkov, Andrey Savinov:
Dynamic Resource Allocation in LEO Satellite. IWCMC 2019: 930-935 - [c8]Stanislav Kruglik
, Kamilla Nazirkhanova, Yury Yanovich
:
Challenges beyond blockchain: scaling, oracles and privacy preserving. REDUNDANCY 2019: 155-158 - [c7]Oleksandr Anyshchenko, Ivan Bohuslavskyi, Stanislav Kruglik
, Yash Madhwal, Alex Ostrovsky, Yury Yanovich
:
Building Cryptotokens Based on Permissioned Blockchain Framework. VTC Fall 2019: 1-5 - [c6]Stanislav Kruglik
, Pavel S. Rybin
, Alexey A. Frolov
:
On the Secrecy Capacity of Distributed Storage with Locality and Availability. VTC Fall 2019: 1-5 - 2018
- [c5]Stanislav Kruglik
, Kamilla Nazirkhanova
, Alexey A. Frolov
:
On Distance Properties of $(r, t, x)$-LRC Codes. ISIT 2018: 1336-1339 - [c4]Andrey Ivanov
, Stanislav Kruglik
, Dmitry Lakontsev:
Cloud MIMO for Smart Parking System. VTC Spring 2018: 1-4 - 2017
- [c3]Stanislav Kruglik
, Alexey A. Frolov
:
Bounds and constructions of codes with all-symbol locality and availability. ISIT 2017: 1023-1027 - [c2]Stanislav Kruglik
, Marina Dudina, Valeriya Potapova, Alexey A. Frolov
:
On one generalization of LRC codes with availability. ITW 2017: 26-30 - [i3]Stanislav Kruglik, Alexey A. Frolov:
Bounds and Constructions of Codes with All-Symbol Locality and Availability. CoRR abs/1702.01314 (2017) - [i2]Stanislav Kruglik, Valeriya Potapova, Alexey A. Frolov:
A method for constructing parity-check matrices of non-binary quasi-cyclic LDPC codes. CoRR abs/1705.10717 (2017) - [i1]Stanislav Kruglik, Marina Dudina, Valeriya Potapova, Alexey A. Frolov:
On One Generalization of LRC Codes with Availability. CoRR abs/1705.11095 (2017) - 2016
- [c1]Kirill Struminsky, Stanislav Kruglik
, Dmitry P. Vetrov, Ivan V. Oseledets
:
A new approach for sparse Bayesian channel estimation in SCMA uplink systems. WCSP 2016: 1-5
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-04-09 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint