Message-locked encryption and secure deduplication M Bellare, S Keelveedhi, T Ristenpart Annual international conference on the theory and applications of …, 2013 | 927 | 2013 |
{DupLESS}:{Server-Aided} encryption for deduplicated storage S Keelveedhi, M Bellare, T Ristenpart 22nd USENIX security symposium (USENIX security 13), 179-194, 2013 | 902 | 2013 |
Efficient garbling from a fixed-key blockcipher M Bellare, VT Hoang, S Keelveedhi, P Rogaway 2013 IEEE Symposium on Security and Privacy, 478-492, 2013 | 435 | 2013 |
Interactive message-locked encryption and secure deduplication M Bellare, S Keelveedhi Public-Key Cryptography--PKC 2015: 18th IACR International Conference on …, 2015 | 177 | 2015 |
Instantiating random oracles via UCEs M Bellare, VT Hoang, S Keelveedhi Annual Cryptology Conference, 398-415, 2013 | 124 | 2013 |
Are AES x86 cache timing attacks still feasible? K Mowery, S Keelveedhi, H Shacham Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 19-24, 2012 | 61 | 2012 |
Authenticated and misuse-resistant encryption of key-dependent data M Bellare, S Keelveedhi Annual Cryptology Conference, 610-629, 2011 | 28 | 2011 |
Cryptography from compression functions: The UCE bridge to the ROM M Bellare, VT Hoang, S Keelveedhi Advances in Cryptology–CRYPTO 2014: 34th Annual Cryptology Conference, Santa …, 2014 | 21 | 2014 |
How secure is deterministic encryption? M Bellare, R Dowsley, S Keelveedhi Public-Key Cryptography--PKC 2015: 18th IACR International Conference on …, 2015 | 15 | 2015 |
Ciphers that securely encipher their own keys M Bellare, D Cash, S Keelveedhi Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 12 | 2011 |