Zombie: Middleboxes that {Don’t} Snoop C Zhang, Z DeStefano, A Arun, J Bonneau, P Grubbs, M Walfish 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2024 | 11 | 2024 |
Weak fiat-shamir attacks on modern proof systems Q Dao, J Miller, O Wright, P Grubbs 2023 IEEE Symposium on Security and Privacy (SP), 199-216, 2023 | 17 | 2023 |
Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More S Menda, J Len, P Grubbs, T Ristenpart Annual International Conference on the Theory and Applications of …, 2023 | 14 | 2023 |
Spartan and bulletproofs are simulation-extractable (for free!) Q Dao, P Grubbs Annual International Conference on the Theory and Applications of …, 2023 | 16 | 2023 |
Interoperability in end-to-end encrypted messaging J Len, E Ghosh, P Grubbs, P Rösler Cryptology ePrint Archive, 2023 | 6 | 2023 |
Learned systems security R Schuster, JP Zhou, T Eisenhofer, P Grubbs, N Papernot arXiv preprint arXiv:2212.10318, 2022 | 3 | 2022 |
Authenticated encryption with key identification J Len, P Grubbs, T Ristenpart International Conference on the Theory and Application of Cryptology and …, 2022 | 3 | 2022 |
Snapshot-oblivious RAMs: sub-logarithmic efficiency for short transcripts Y Du, D Genkin, P Grubbs Annual International Cryptology Conference, 152-181, 2022 | 4 | 2022 |
Anonymous, robust post-quantum public key encryption P Grubbs, V Maram, KG Paterson Annual International Conference on the Theory and Applications of …, 2022 | 40 | 2022 |
{Zero-Knowledge} Middleboxes P Grubbs, A Arun, Y Zhang, J Bonneau, M Walfish 31st USENIX Security Symposium (USENIX Security 22), 4255-4272, 2022 | 39 | 2022 |
Partitioning oracle attacks J Len, P Grubbs, T Ristenpart 30th USENIX security symposium (USENIX Security 21), 195-212, 2021 | 48 | 2021 |
Wildcard search in encrypted text using order preserving encryption P Grubbs US Patent 10,614,135, 2020 | 1 | 2020 |
Breaking and Building Encrypted Databases PA Grubbs Cornell University, 2020 | | 2020 |
Pancake: Frequency smoothing for encrypted data stores P Grubbs, A Khandelwal, MS Lacharité, L Brown, L Li, R Agarwal, ... 29th USENIX Security Symposium (USENIX Security 20), 2451-2468, 2020 | 75 | 2020 |
Learning to reconstruct: Statistical learning theory and encrypted database attacks P Grubbs, MS Lacharité, B Minaud, KG Paterson 2019 IEEE Symposium on Security and Privacy (SP), 1067-1083, 2019 | 145 | 2019 |
Asymmetric message franking: Content moderation for metadata-private end-to-end encryption N Tyagi, P Grubbs, J Len, I Miers, T Ristenpart Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 41 | 2019 |
Pump up the Volume P Grubbs, MS Lacharite, B Minaud, KG Paterson Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | | 2018 |
Pump up the volume: Practical database reconstruction from volume leakage on range queries P Grubbs, MS Lacharité, B Minaud, KG Paterson Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 177 | 2018 |
Fast message franking: From invisible salamanders to encryptment Y Dodis, P Grubbs, T Ristenpart, J Woodage Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 103 | 2018 |
Wildcard search in encrypted text using order preserving encryption P Grubbs US Patent 9,760,637, 2017 | 18 | 2017 |