Spremljaj
Julia Len
Julia Len
Preverjeni e-poštni naslov na csail.mit.edu - Domača stran
Naslov
Navedeno
Navedeno
Leto
Partitioning oracle attacks
J Len, P Grubbs, T Ristenpart
30th USENIX security symposium (USENIX Security 21), 195-212, 2021
662021
Asymmetric message franking: Content moderation for metadata-private end-to-end encryption
N Tyagi, P Grubbs, J Len, I Miers, T Ristenpart
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
492019
Interactive network visualization in Jupyter notebooks: visJS2jupyter
SB Rosenthal, J Len, M Webster, A Gary, A Birmingham, KM Fisch
Bioinformatics 34 (1), 126-128, 2018
222018
Context discovery and commitment attacks: How to break ccm, eax, siv, and more
S Menda, J Len, P Grubbs, T Ristenpart
Annual International Conference on the Theory and Applications of …, 2023
212023
Fuzzy message detection
G Beck, J Len, I Miers, M Green
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
212021
E2e encryption for zoom meetings
J Blum, S Booth, O Gal, M Krohn, J Len, K Lyons, A Marcedone, M Maxim, ...
Zoom Video Commun., Inc., San Jose, CA, Tech. Rep. Version 2 (1), 57, 2020
132020
Interoperability in end-to-end encrypted messaging
J Len, E Ghosh, P Grubbs, P Rösler
Cryptology ePrint Archive, 2023
122023
Better than advertised: Improved collision-resistance guarantees for md-based hash functions
M Bellare, J Jaeger, J Len
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
92017
{OPTIKS}: An Optimized Key Transparency System
J Len, M Chase, E Ghosh, K Laine, RC Moreno
33rd USENIX Security Symposium (USENIX Security 24), 4355-4372, 2024
72024
Orca: Blocklisting in {Sender-Anonymous} messaging
N Tyagi, J Len, I Miers, T Ristenpart
31st USENIX Security Symposium (USENIX Security 22), 2299-2316, 2022
72022
ELEKTRA: efficient lightweight multi-device Key Transparency
J Len, M Chase, E Ghosh, D Jost, B Kesavan, A Marcedone
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
62023
Authenticated encryption with key identification
J Len, P Grubbs, T Ristenpart
International Conference on the Theory and Application of Cryptology and …, 2022
62022
E2e encryption for zoom meetings. White Paper–Github Repository zoom/zoom-e2e-whitepaper, Version 3.2
J Blum, S Booth, B Chen, O Gal, M Krohn, J Len, K Lyons, A Marcedone, ...
52022
Zoom end-to-end encryption whitepaper
J Blum, S Booth, B Chen, O Gal, M Krohn, J Len, K Lyons, A Marcedone, ...
Github, San Francisco, White Paper, 2020
52020
Zoom Cryptography Whitepaper
J Blum, S Booth, B Chen, O Gal, M Krohn, J Len, K Lyons, A Marcedone, ...
Zoom Video Communications, Inc., Nov 21, 2023
32023
Designing Secure-by-Default Cryptography for Computer Systems
J Len
Cornell University, 2024
2024
Flexible Authenticated Encryption
S Menda, J Len, VT Hoang, M Bellare, T Ristenpart
2023
Context Discovery and Commitment Attacks
S Menda, J Len
Sistem trenutno ne more izvesti postopka. Poskusite znova pozneje.
Članki 1–18