Benjamin Fuller

Orcid: 0000-0001-6450-0088

Affiliations:
  • University of Connecticut, Storrs, CT, USA
  • Boston University, MA, USA (PhD 2015)
  • Massachusetts Institute of Technology, Lincoln Laboratory, Boston, MA, USA (2007 - 2016)


According to our database1, Benjamin Fuller authored at least 49 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FiveEyes: Cryptographic Biometric Authentication from the Iris.
IACR Cryptol. ePrint Arch., 2024

The Decisive Power of Indecision: Low-Variance Risk-Limiting Audits and Election Contestation via Marginal Mark Recording.
CoRR, 2024

2023
Multi random projection inner product encryption, applications to proximity searchable encryption for the iris biometric.
Inf. Comput., August, 2023

FASHION: Functional and Attack Graph Secured HybrId Optimization of Virtualized Networks.
IEEE Trans. Dependable Secur. Comput., 2023

Private Eyes: Zero-Leakage Iris Searchable Encryption.
IACR Cryptol. ePrint Arch., 2023

Impossibility of Efficient Information-Theoretic Fuzzy Extraction.
IACR Cryptol. ePrint Arch., 2023

Upgrading Fuzzy Extractors.
IACR Cryptol. ePrint Arch., 2023

Adaptive Risk-Limiting Comparison Audits.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model.
IACR Cryptol. ePrint Arch., 2022

Privacy Attacks Against Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models.
CoRR, 2022

Lazy Risk-Limiting Ballot Comparison Audits.
CoRR, 2022

Inverting Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models.
Proceedings of the IEEE International Joint Conference on Biometrics, 2022

DUELMIPs: Optimizing SDN Functionality and Security.
Proceedings of the 28th International Conference on Principles and Practice of Constraint Programming, 2022

Proximity Searchable Encryption for the Iris Biometric.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Reusable Fuzzy Extractors for Low-Entropy Distributions.
J. Cryptol., 2021

Code Offset in the Exponent.
Proceedings of the 2nd Conference on Information-Theoretic Cryptography, 2021

2020
When Are Fuzzy Extractors Possible?
IEEE Trans. Inf. Theory, 2020

Proximity Searchable Encryption for Biometrics.
IACR Cryptol. ePrint Arch., 2020

Resist: Reconstruction of irises from templates.
Proceedings of the 2020 IEEE International Joint Conference on Biometrics, 2020

Same Point Composable and Nonmalleable Obfuscated Point Functions.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
FASHION: Functional and Attack graph Secured HybrId Optimization of virtualized Networks.
CoRR, 2019

Cryptographic Authentication from the Iris.
Proceedings of the Information Security - 22nd International Conference, 2019

Continuous-Source Fuzzy Extractors: Source uncertainty and insecurity.
Proceedings of the IEEE International Symposium on Information Theory, 2019

ThirdEye: Triplet Based Iris Recognition without Normalization.
Proceedings of the 10th IEEE International Conference on Biometrics Theory, 2019

DOCSDN: Dynamic and Optimal Configuration of Software-Defined Networks.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
When are Continuous-Source Fuzzy Extractors Possible?
IACR Cryptol. ePrint Arch., 2018

Non-malleable Digital Lockers.
IACR Cryptol. ePrint Arch., 2018

Handling Correlated Errors: Hardness of LWE in the Exponent.
IACR Cryptol. ePrint Arch., 2018

Pseudoentropic Isometries: A New Framework for Fuzzy Extractor Reusability.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Unconstrained Iris Segmentation Using Convolutional Neural Networks.
Proceedings of the Computer Vision - ACCV 2018 Workshops, 2018

2017
Reusable Authentication from the Iris.
IACR Cryptol. ePrint Arch., 2017

Public Key Cryptosystems with Noisy Secret Keys.
IACR Cryptol. ePrint Arch., 2017

Environmental Authentication in Malware.
IACR Cryptol. ePrint Arch., 2017

FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise.
Cryptogr., 2017

SoK: Cryptographically Protected Database Search.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

2016
Catching MPC Cheaters: Identification and Openability.
IACR Cryptol. ePrint Arch., 2016

2015
Strong key derivation from noisy sources
PhD thesis, 2015

Iris Biometric Security Challenges and Possible Solutions: For your eyes only?Using the iris as a key.
IEEE Signal Process. Mag., 2015

A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy.
J. Cryptol., 2015

Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy.
IACR Cryptol. ePrint Arch., 2015

2014
Where are Fuzzy Extractors Possible?
IACR Cryptol. ePrint Arch., 2014

Key Derivation From Noisy Sources With More Errors Than Entropy.
IACR Cryptol. ePrint Arch., 2014

Robust keys from physical unclonable functions.
Proceedings of the 2014 IEEE International Symposium on Hardware-Oriented Security and Trust, 2014

2013
Computational Fuzzy Extractors.
IACR Cryptol. ePrint Arch., 2013

2012
Computational Entropy and Information Leakage.
IACR Cryptol. ePrint Arch., 2012

DSKE: Dynamic Set Key Encryption.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

2010
ASE: Authenticated Statement Exchange.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

GROK: A Practical System for Securing Group Communications.
Proceedings of The Ninth IEEE International Symposium on Networking Computing and Applications, 2010

2007
Integrated Environment Management for Information Operations Testbeds.
Proceedings of the 4th International Workshop on Visualization for Computer Security, 2007


  Loading...