关注
Charalampos Papamanthou
Charalampos Papamanthou
在 yale.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Hawk: The blockchain model of cryptography and privacy-preserving smart contracts
A Kosba, A Miller, E Shi, Z Wen, C Papamanthou
2016 IEEE symposium on security and privacy (SP), 839-858, 2016
31052016
Dynamic provable data possession
CC Erway, A Küpçü, C Papamanthou, R Tamassia
ACM Transactions on Information and System Security (TISSEC) 17 (4), 1-29, 2015
18792015
Dynamic searchable symmetric encryption
S Kamara, C Papamanthou, T Roeder
Proceedings of the 2012 ACM conference on Computer and communications …, 2012
13322012
Practical dynamic searchable encryption with small leakage
E Stefanov, C Papamanthou, E Shi
Cryptology ePrint Archive, 2013
7162013
Parallel and dynamic searchable symmetric encryption
S Kamara, C Papamanthou
Financial Cryptography and Data Security: 17th International Conference, FC …, 2013
6742013
All your queries are belong to us: the power of {File-Injection} attacks on searchable encryption
Y Zhang, J Katz, C Papamanthou
25th USENIX Security Symposium (USENIX Security 16), 707-720, 2016
5592016
Practical dynamic proofs of retrievability
E Shi, E Stefanov, C Papamanthou
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
2482013
New constructions for forward and backward private symmetric searchable encryption
J Ghareh Chamani, D Papadopoulos, C Papamanthou, R Jalili
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2472018
Signatures of correct computation
C Papamanthou, E Shi, R Tamassia
Theory of Cryptography Conference, 222-242, 2013
2402013
Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation
T Xie, J Zhang, Y Zhang, C Papamanthou, D Song
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
2322019
vSQL: Verifying arbitrary SQL queries over dynamic outsourced databases
Y Zhang, D Genkin, J Katz, D Papadopoulos, C Papamanthou
2017 IEEE Symposium on Security and Privacy (SP), 863-880, 2017
2212017
TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption
S Garg, P Mohassel, C Papamanthou
Annual International Cryptology Conference, 563-592, 2016
2082016
Optimal verification of operations on dynamic sets
C Papamanthou, R Tamassia, N Triandopoulos
Annual Cryptology Conference, 91-110, 2011
1902011
Authenticated hash tables
C Papamanthou, R Tamassia, N Triandopoulos
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1562008
IntegriDB: Verifiable SQL for outsourced databases
Y Zhang, J Katz, C Papamanthou
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
1492015
Efficient dynamic searchable encryption with forward privacy
M Etemad, A Küpçü, C Papamanthou, D Evans
arXiv preprint arXiv:1710.00208, 2017
1432017
Preserving link privacy in social network based systems
P Mittal, C Papamanthou, D Song
arXiv preprint arXiv:1208.6189, 2012
1372012
xJsnark: A framework for efficient verifiable computation
A Kosba, C Papamanthou, E Shi
2018 IEEE Symposium on Security and Privacy (SP), 944-961, 2018
1222018
Algorithms for location estimation based on rssi sampling
C Papamanthou, FP Preparata, R Tamassia
International Symposium on Algorithms and Experiments for Sensor Systems …, 2008
1142008
Dynamic searchable encryption with small client storage
I Demertzis, JG Chamani, D Papadopoulos, C Papamanthou
Cryptology ePrint Archive, 2019
1022019
系统目前无法执行此操作,请稍后再试。
文章 1–20