Partitioning oracle attacks J Len, P Grubbs, T Ristenpart 30th USENIX security symposium (USENIX Security 21), 195-212, 2021 | 66 | 2021 |
Asymmetric message franking: Content moderation for metadata-private end-to-end encryption N Tyagi, P Grubbs, J Len, I Miers, T Ristenpart Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 49 | 2019 |
Interactive network visualization in Jupyter notebooks: visJS2jupyter SB Rosenthal, J Len, M Webster, A Gary, A Birmingham, KM Fisch Bioinformatics 34 (1), 126-128, 2018 | 22 | 2018 |
Context discovery and commitment attacks: How to break ccm, eax, siv, and more S Menda, J Len, P Grubbs, T Ristenpart Annual International Conference on the Theory and Applications of …, 2023 | 21 | 2023 |
Fuzzy message detection G Beck, J Len, I Miers, M Green Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 21 | 2021 |
E2e encryption for zoom meetings J Blum, S Booth, O Gal, M Krohn, J Len, K Lyons, A Marcedone, M Maxim, ... Zoom Video Commun., Inc., San Jose, CA, Tech. Rep. Version 2 (1), 57, 2020 | 13 | 2020 |
Interoperability in end-to-end encrypted messaging J Len, E Ghosh, P Grubbs, P Rösler Cryptology ePrint Archive, 2023 | 12 | 2023 |
Better than advertised: Improved collision-resistance guarantees for md-based hash functions M Bellare, J Jaeger, J Len Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 9 | 2017 |
{OPTIKS}: An Optimized Key Transparency System J Len, M Chase, E Ghosh, K Laine, RC Moreno 33rd USENIX Security Symposium (USENIX Security 24), 4355-4372, 2024 | 7 | 2024 |
Orca: Blocklisting in {Sender-Anonymous} messaging N Tyagi, J Len, I Miers, T Ristenpart 31st USENIX Security Symposium (USENIX Security 22), 2299-2316, 2022 | 7 | 2022 |
ELEKTRA: efficient lightweight multi-device Key Transparency J Len, M Chase, E Ghosh, D Jost, B Kesavan, A Marcedone Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 6 | 2023 |
Authenticated encryption with key identification J Len, P Grubbs, T Ristenpart International Conference on the Theory and Application of Cryptology and …, 2022 | 6 | 2022 |
E2e encryption for zoom meetings. White Paper–Github Repository zoom/zoom-e2e-whitepaper, Version 3.2 J Blum, S Booth, B Chen, O Gal, M Krohn, J Len, K Lyons, A Marcedone, ... | 5 | 2022 |
Zoom end-to-end encryption whitepaper J Blum, S Booth, B Chen, O Gal, M Krohn, J Len, K Lyons, A Marcedone, ... Github, San Francisco, White Paper, 2020 | 5 | 2020 |
Zoom Cryptography Whitepaper J Blum, S Booth, B Chen, O Gal, M Krohn, J Len, K Lyons, A Marcedone, ... Zoom Video Communications, Inc., Nov 21, 2023 | 3 | 2023 |
Designing Secure-by-Default Cryptography for Computer Systems J Len Cornell University, 2024 | | 2024 |
Flexible Authenticated Encryption S Menda, J Len, VT Hoang, M Bellare, T Ristenpart | | 2023 |
Context Discovery and Commitment Attacks S Menda, J Len | | |