Charalampos Papamanthou
Orcid: 0000-0002-1905-9403Affiliations:
- Yale University, USA
- University of Maryland, College Park (former)
- University of California at Berkeley, Computer Science Division (former)
- Brown University, Department of Computer Science (former)
According to our database1,
Charalampos Papamanthou
authored at least 111 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on ece.umd.edu
On csauthors.net:
Bibliography
2025
CoRR, August, 2025
Proc. VLDB Endow., July, 2025
IACR Cryptol. ePrint Arch., 2025
HydraProofs: Optimally Computing All Proofs in a Vector Commitment (With Applications to Efficient zkSNARKs Over Data from Multiple Users).
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the 2025 Annual ACM-SIAM Symposium on Discrete Algorithms, 2025
2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Deterministic Byzantine Agreement with Adaptive <i>O</i>(<i>n</i> · <i>f</i>) Communication.
Proceedings of the 2024 ACM-SIAM Symposium on Discrete Algorithms, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information Retrieval from DDH.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Response-Hiding Encrypted Ranges: Revisiting Security via Parametrized Leakage-Abuse Attacks.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
2020
IACR Cryptol. ePrint Arch., 2020
MIRAGE: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
The State of the Uniform: Attacks on Encrypted Databases Beyond the Uniform Query Distribution.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proc. Priv. Enhancing Technol., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018
Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, 2018
2017
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the 2017 ACM International Conference on Management of Data, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption.
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the IEEE Symposium on Security and Privacy, 2016
TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
2015
Proc. VLDB Endow., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014
2013
Computer Security.
Proceedings of the Handbook on Graph Drawing and Visualization., 2013
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the Advances in Cryptology, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proc. VLDB Endow., 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
PhD thesis, 2011
Cryptography for Efficiency: Authenticated Data Structures Based on Lattices and Parallel Online Memory Checking.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
2010
Corrigendum: On the initialization methods of an exterior point algorithm for the assignment problem.
Int. J. Comput. Math., 2010
On the initialization methods of an exterior point algorithm for the assignment problem.
Int. J. Comput. Math., 2010
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
Discret. Optim., 2008
Proceedings of the 5th International Workshop on Visualization for Computer Security, 2008
Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, 2008
Proceedings of the Information Security, 11th International Conference, 2008
Proceedings of the Graph Drawing, 16th International Symposium, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2008
2007
Proceedings of the Experimental Algorithms, 6th International Workshop, 2007
Proceedings of the Information and Communications Security, 9th International Conference, 2007
2006
Proceedings of the Graph Drawing, 14th International Symposium, 2006
2005
Proceedings of the Graph Drawing, 13th International Symposium, 2005
2004
Computational experience with exterior point algorithms for the transportation problem.
Appl. Math. Comput., 2004
Proceedings of the Graph Drawing, 12th International Symposium, 2004
2003
Proceedings of the 8th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2003