Hawk: The blockchain model of cryptography and privacy-preserving smart contracts A Kosba, A Miller, E Shi, Z Wen, C Papamanthou 2016 IEEE symposium on security and privacy (SP), 839-858, 2016 | 3105 | 2016 |
Dynamic provable data possession CC Erway, A Küpçü, C Papamanthou, R Tamassia ACM Transactions on Information and System Security (TISSEC) 17 (4), 1-29, 2015 | 1879 | 2015 |
Dynamic searchable symmetric encryption S Kamara, C Papamanthou, T Roeder Proceedings of the 2012 ACM conference on Computer and communications …, 2012 | 1332 | 2012 |
Practical dynamic searchable encryption with small leakage E Stefanov, C Papamanthou, E Shi Cryptology ePrint Archive, 2013 | 716 | 2013 |
Parallel and dynamic searchable symmetric encryption S Kamara, C Papamanthou Financial Cryptography and Data Security: 17th International Conference, FC …, 2013 | 674 | 2013 |
All your queries are belong to us: the power of {File-Injection} attacks on searchable encryption Y Zhang, J Katz, C Papamanthou 25th USENIX Security Symposium (USENIX Security 16), 707-720, 2016 | 559 | 2016 |
Practical dynamic proofs of retrievability E Shi, E Stefanov, C Papamanthou Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 248 | 2013 |
New constructions for forward and backward private symmetric searchable encryption J Ghareh Chamani, D Papadopoulos, C Papamanthou, R Jalili Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 247 | 2018 |
Signatures of correct computation C Papamanthou, E Shi, R Tamassia Theory of Cryptography Conference, 222-242, 2013 | 240 | 2013 |
Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation T Xie, J Zhang, Y Zhang, C Papamanthou, D Song Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 232 | 2019 |
vSQL: Verifying arbitrary SQL queries over dynamic outsourced databases Y Zhang, D Genkin, J Katz, D Papadopoulos, C Papamanthou 2017 IEEE Symposium on Security and Privacy (SP), 863-880, 2017 | 221 | 2017 |
TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption S Garg, P Mohassel, C Papamanthou Annual International Cryptology Conference, 563-592, 2016 | 208 | 2016 |
Optimal verification of operations on dynamic sets C Papamanthou, R Tamassia, N Triandopoulos Annual Cryptology Conference, 91-110, 2011 | 190 | 2011 |
Authenticated hash tables C Papamanthou, R Tamassia, N Triandopoulos Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 156 | 2008 |
IntegriDB: Verifiable SQL for outsourced databases Y Zhang, J Katz, C Papamanthou Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 149 | 2015 |
Efficient dynamic searchable encryption with forward privacy M Etemad, A Küpçü, C Papamanthou, D Evans arXiv preprint arXiv:1710.00208, 2017 | 143 | 2017 |
Preserving link privacy in social network based systems P Mittal, C Papamanthou, D Song arXiv preprint arXiv:1208.6189, 2012 | 137 | 2012 |
xJsnark: A framework for efficient verifiable computation A Kosba, C Papamanthou, E Shi 2018 IEEE Symposium on Security and Privacy (SP), 944-961, 2018 | 122 | 2018 |
Algorithms for location estimation based on rssi sampling C Papamanthou, FP Preparata, R Tamassia International Symposium on Algorithms and Experiments for Sensor Systems …, 2008 | 114 | 2008 |
Dynamic searchable encryption with small client storage I Demertzis, JG Chamani, D Papadopoulos, C Papamanthou Cryptology ePrint Archive, 2019 | 102 | 2019 |