{Zero-Knowledge} Middleboxes P Grubbs, A Arun, Y Zhang, J Bonneau, M Walfish 31st USENIX Security Symposium (USENIX Security 22), 4255-4272, 2022 | 32 | 2022 |
Anonymous, robust post-quantum public key encryption P Grubbs, V Maram, KG Paterson Annual International Conference on the Theory and Applications of …, 2022 | 37 | 2022 |
Asymmetric message franking: Content moderation for metadata-private end-to-end encryption N Tyagi, P Grubbs, J Len, I Miers, T Ristenpart Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 40 | 2019 |
Authenticated encryption with key identification J Len, P Grubbs, T Ristenpart International Conference on the Theory and Application of Cryptology and …, 2022 | 3 | 2022 |
Breaking and Building Encrypted Databases PA Grubbs Cornell University, 2020 | | 2020 |
Breaking web applications built on top of encrypted data P Grubbs, R McPherson, M Naveed, T Ristenpart, V Shmatikov Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 123 | 2016 |
Context Discovery and Commitment Attacks S Menda, J Len | | |
Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More S Menda, J Len, P Grubbs, T Ristenpart Annual International Conference on the Theory and Applications of …, 2023 | 13 | 2023 |
Encryption in the cloud using enterprise managed keys K Narayan, P Grubbs US Patent 9,716,696, 2017 | 7 | 2017 |
Encryption in the cloud using enterprise managed keys K Narayan, P Grubbs US Patent 9,413,730, 2016 | 44 | 2016 |
Fast message franking: From invisible salamanders to encryptment Y Dodis, P Grubbs, T Ristenpart, J Woodage Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 99 | 2018 |
GPU and CPU parallelization of honest-but-curious secure two-party computation N Husted, S Myers, A Shelat, P Grubbs Proceedings of the 29th Annual Computer Security Applications Conference …, 2013 | 55 | 2013 |
Interoperability in end-to-end encrypted messaging J Len, E Ghosh, P Grubbs, P Rösler Cryptology ePrint Archive, 2023 | 5 | 2023 |
Leakage-abuse attacks against order-revealing encryption P Grubbs, K Sekniqi, V Bindschaedler, M Naveed, T Ristenpart 2017 IEEE symposium on security and privacy (SP), 655-672, 2017 | 249 | 2017 |
Leakage-abuse attacks against searchable encryption D Cash, P Grubbs, J Perry, T Ristenpart Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 708 | 2015 |
Learned systems security R Schuster, JP Zhou, T Eisenhofer, P Grubbs, N Papernot arXiv preprint arXiv:2212.10318, 2022 | 3 | 2022 |
Learning to Reconstruct P Grubbs, MS Lacharité, B Minaud, K Paterson | | |
Learning to reconstruct: Statistical learning theory and encrypted database attacks P Grubbs, MS Lacharité, B Minaud, KG Paterson 2019 IEEE Symposium on Security and Privacy (SP), 1067-1083, 2019 | 142 | 2019 |
Making encryption work in the cloud A Boldyreva, P Grubbs Network Security 2014 (10), 8-10, 2014 | 7 | 2014 |
Message franking via committing authenticated encryption P Grubbs, J Lu, T Ristenpart Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017 | 106 | 2017 |