-
Interactive message-locked encryption and secure deduplication
with Mihir Bellare
PKC 2015
-
How Secure is Deterministic Encryption?
with Mihir Bellare and Rafael Dowsley
PKC 2015
-
Cryptography from compression functions: The UCE bridge to the ROM
with Mihir Bellare and Viet Tung Hoang
CRYPTO 2014
|
Full version
-
Instantiating Random Oracles via UCEs
with Mihir Bellare and Viet Tung Hoang
CRYPTO 2013
|
Full version
-
DupLESS: Server aided encryption for deduplicated storage
-
Efficient Garbling from a Fixed-Key Blockcipher
with Mihir Bellare, Viet Tung Hoang, and Phillip Rogaway
IEEE Symposium on Security and Privacy (Oakland 2013) |
Full version |
Source code
-
Message-Locked Encryption and Secure Deduplication
-
Are AES x86 Cache Timing Attacks Still Feasible?
with Keaton Mowery and Hovav Shacham
CCSW 2012 |
Full version
-
Ciphers that Encipher their own Keys
with Mihir Bellare and David Cash
ACM-CCS 2011 |
Full version
-
Authenticated and Misuse-Resistant Encryption of Key-Dependent Data