关注
Paul Grubbs
Paul Grubbs
在 umich.edu 的电子邮件经过验证 - 首页
标题
引用次数
年份
{Zero-Knowledge} Middleboxes
P Grubbs, A Arun, Y Zhang, J Bonneau, M Walfish
31st USENIX Security Symposium (USENIX Security 22), 4255-4272, 2022
322022
Anonymous, robust post-quantum public key encryption
P Grubbs, V Maram, KG Paterson
Annual International Conference on the Theory and Applications of …, 2022
372022
Asymmetric message franking: Content moderation for metadata-private end-to-end encryption
N Tyagi, P Grubbs, J Len, I Miers, T Ristenpart
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
402019
Authenticated encryption with key identification
J Len, P Grubbs, T Ristenpart
International Conference on the Theory and Application of Cryptology and …, 2022
32022
Breaking and Building Encrypted Databases
PA Grubbs
Cornell University, 2020
2020
Breaking web applications built on top of encrypted data
P Grubbs, R McPherson, M Naveed, T Ristenpart, V Shmatikov
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1232016
Context Discovery and Commitment Attacks
S Menda, J Len
Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More
S Menda, J Len, P Grubbs, T Ristenpart
Annual International Conference on the Theory and Applications of …, 2023
132023
Encryption in the cloud using enterprise managed keys
K Narayan, P Grubbs
US Patent 9,716,696, 2017
72017
Encryption in the cloud using enterprise managed keys
K Narayan, P Grubbs
US Patent 9,413,730, 2016
442016
Fast message franking: From invisible salamanders to encryptment
Y Dodis, P Grubbs, T Ristenpart, J Woodage
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
992018
GPU and CPU parallelization of honest-but-curious secure two-party computation
N Husted, S Myers, A Shelat, P Grubbs
Proceedings of the 29th Annual Computer Security Applications Conference …, 2013
552013
Interoperability in end-to-end encrypted messaging
J Len, E Ghosh, P Grubbs, P Rösler
Cryptology ePrint Archive, 2023
52023
Leakage-abuse attacks against order-revealing encryption
P Grubbs, K Sekniqi, V Bindschaedler, M Naveed, T Ristenpart
2017 IEEE symposium on security and privacy (SP), 655-672, 2017
2492017
Leakage-abuse attacks against searchable encryption
D Cash, P Grubbs, J Perry, T Ristenpart
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
7082015
Learned systems security
R Schuster, JP Zhou, T Eisenhofer, P Grubbs, N Papernot
arXiv preprint arXiv:2212.10318, 2022
32022
Learning to Reconstruct
P Grubbs, MS Lacharité, B Minaud, K Paterson
Learning to reconstruct: Statistical learning theory and encrypted database attacks
P Grubbs, MS Lacharité, B Minaud, KG Paterson
2019 IEEE Symposium on Security and Privacy (SP), 1067-1083, 2019
1422019
Making encryption work in the cloud
A Boldyreva, P Grubbs
Network Security 2014 (10), 8-10, 2014
72014
Message franking via committing authenticated encryption
P Grubbs, J Lu, T Ristenpart
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
1062017
系统目前无法执行此操作,请稍后再试。
文章 1–20