دنبال کردن
Paul Grubbs
Paul Grubbs
ایمیل تأیید شده در umich.edu - صفحهٔ اصلی
عنوان
نقل شده توسط
نقل شده توسط
سال
Leakage-abuse attacks against searchable encryption
D Cash, P Grubbs, J Perry, T Ristenpart
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
7772015
Leakage-abuse attacks against order-revealing encryption
P Grubbs, K Sekniqi, V Bindschaedler, M Naveed, T Ristenpart
2017 IEEE symposium on security and privacy (SP), 655-672, 2017
2712017
Pump up the volume: Practical database reconstruction from volume leakage on range queries
P Grubbs, MS Lacharité, B Minaud, KG Paterson
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1992018
Learning to reconstruct: Statistical learning theory and encrypted database attacks
P Grubbs, MS Lacharité, B Minaud, KG Paterson
2019 IEEE symposium on security and privacy (SP), 1067-1083, 2019
1632019
Message franking via committing authenticated encryption
P Grubbs, J Lu, T Ristenpart
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
1302017
Breaking web applications built on top of encrypted data
P Grubbs, R McPherson, M Naveed, T Ristenpart, V Shmatikov
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1282016
Fast message franking: From invisible salamanders to encryptment
Y Dodis, P Grubbs, T Ristenpart, J Woodage
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
1272018
The tao of inference in privacy-protected databases
V Bindschaedler, P Grubbs, D Cash, T Ristenpart, V Shmatikov
Cryptology ePrint Archive, 2017
1192017
Why Your Encrypted Database Is Not Secure
P Grubbs, T Ristenpart, V Shmatikov
Hot Topics in Operating Systems, 2017
1132017
Pancake: Frequency smoothing for encrypted data stores
P Grubbs, A Khandelwal, MS Lacharité, L Brown, L Li, R Agarwal, ...
29th USENIX Security Symposium (USENIX Security 20), 2451-2468, 2020
912020
Partitioning oracle attacks
J Len, P Grubbs, T Ristenpart
30th USENIX security symposium (USENIX Security 21), 195-212, 2021
652021
GPU and CPU parallelization of honest-but-curious secure two-party computation
N Husted, S Myers, A Shelat, P Grubbs
Proceedings of the 29th Annual Computer Security Applications Conference …, 2013
592013
Anonymous, robust post-quantum public key encryption
P Grubbs, V Maram, KG Paterson
Annual international conference on the theory and applications of …, 2022
532022
Encryption in the cloud using enterprise managed keys
K Narayan, P Grubbs
US Patent 9,413,730, 2016
502016
{Zero-Knowledge} Middleboxes
P Grubbs, A Arun, Y Zhang, J Bonneau, M Walfish
31st USENIX Security Symposium (USENIX Security 22), 4255-4272, 2022
492022
Asymmetric message franking: Content moderation for metadata-private end-to-end encryption
N Tyagi, P Grubbs, J Len, I Miers, T Ristenpart
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
492019
Spartan and bulletproofs are simulation-extractable (for free!)
Q Dao, P Grubbs
Annual International Conference on the Theory and Applications of …, 2023
282023
Weak fiat-shamir attacks on modern proof systems
Q Dao, J Miller, O Wright, P Grubbs
2023 IEEE Symposium on Security and Privacy (SP), 199-216, 2023
272023
Searchable encryption for cloud storage
S Sarukkai, K Narayan, R Gupta, P Grubbs
US Patent 9,454,673, 2016
232016
Context discovery and commitment attacks: How to break ccm, eax, siv, and more
S Menda, J Len, P Grubbs, T Ristenpart
Annual International Conference on the Theory and Applications of …, 2023
202023
سیستم در حال حاضر قادر به انجام عملکرد نیست. بعداً دوباره امتحان کنید.
مقاله‌ها 1–20