Charalampos Papamanthou

According to our database1, Charalampos Papamanthou authored at least 83 papers between 2003 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Practical Private Range Search in Depth.
ACM Trans. Database Syst., 2018

Verifiable Graph Processing.
ACM Trans. Priv. Secur., 2018

Efficient Searchable Encryption Through Compression.
PVLDB, 2018

Efficient Dynamic Searchable Encryption with Forward Privacy.
PoPETs, 2018

Transparency Logs via Append-only Authenticated Dictionaries.
IACR Cryptology ePrint Archive, 2018

Data Recovery on Encrypted Databases With k-Nearest Neighbor Query Leakage.
IACR Cryptology ePrint Archive, 2018

Edrax: A Cryptocurrency with Stateless Transaction Validation.
IACR Cryptology ePrint Archive, 2018

Privacy in decentralized cryptocurrencies.
Commun. ACM, 2018

vRAM: Faster Verifiable RAM with Program-Independent Preprocessing.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

xJsnark: A Framework for Efficient Verifiable Computation.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Understanding User Tradeoffs for Search in Encrypted Communication.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

New Constructions for Forward and Backward Private Symmetric Searchable Encryption.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

DATS - Data Containers for Web Applications.
Proceedings of the Twenty-Third International Conference on Architectural Support for Programming Languages and Operating Systems, 2018

2017
A Zero-Knowledge Version of vSQL.
IACR Cryptology ePrint Archive, 2017

vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.
IACR Cryptology ePrint Archive, 2017

Searchable Encryption with Optimal Locality: Achieving Sublogarithmic Read Efficiency.
IACR Cryptology ePrint Archive, 2017

Efficient Dynamic Searchable Encryption with Forward Privacy.
CoRR, 2017

vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Fast Searchable Encryption With Tunable Locality.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

An Expressive (Zero-Knowledge) Set Accumulator.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

Accountable Storage.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption.
IACR Cryptology ePrint Archive, 2016

Authenticated Hash Tables Based on Cryptographic Accumulators.
Algorithmica, 2016

All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption.
Proceedings of the 25th USENIX Security Symposium, 2016

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Dynamic Provable Data Possession.
ACM Trans. Inf. Syst. Secur., 2015

Practical Authenticated Pattern Matching with Optimal Proof Size.
PVLDB, 2015

How to Use SNARKs in Universally Composable Protocols.
IACR Cryptology ePrint Archive, 2015

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.
IACR Cryptology ePrint Archive, 2015

TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption.
IACR Cryptology ePrint Archive, 2015

Oblivious Network RAM.
IACR Cryptology ePrint Archive, 2015

On the Complexity of the Minimum Independent Set Partition Problem.
Proceedings of the Computing and Combinatorics - 21st International Conference, 2015

IntegriDB: Verifiable SQL for Outsourced Databases.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
TRUESET: Nearly Practical Verifiable Set Computations.
IACR Cryptology ePrint Archive, 2014

Accountable Storage.
IACR Cryptology ePrint Archive, 2014

TRUESET: Faster Verifiable Set Computations.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Practical Dynamic Searchable Encryption with Small Leakage.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

ALITHEIA: Towards Practical Verifiable Graph Processing.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Streaming Authenticated Data Structures: Abstraction and Implementation.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

2013
Computer Security.
Proceedings of the Handbook on Graph Drawing and Visualization., 2013

Practical Dynamic Searchable Encryption with Small Leakage.
IACR Cryptology ePrint Archive, 2013

Parallel and Dynamic Searchable Symmetric Encryption.
IACR Cryptology ePrint Archive, 2013

Signatures of Correct Computation.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Preserving Link Privacy in Social Network Based Systems.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Parallel and Dynamic Searchable Symmetric Encryption.
Proceedings of the Financial Cryptography and Data Security, 2013

Streaming Authenticated Data Structures.
Proceedings of the Advances in Cryptology, 2013

Practical dynamic proofs of retrievability.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Efficient Verification of Web-Content Searching Through Authenticated Web Crawlers.
PVLDB, 2012

Dynamic Searchable Symmetric Encryption.
IACR Cryptology ePrint Archive, 2012

Preserving Link Privacy in Social Network Based Systems
CoRR, 2012

Verifying Search Results Over Web Collections
CoRR, 2012

Dynamic searchable symmetric encryption.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Cryptography for Efficiency: Authenticated Data Structures Based on Lattices and Parallel Online Memory Checking.
IACR Cryptology ePrint Archive, 2011

Publicly Verifiable Delegation of Computation.
IACR Cryptology ePrint Archive, 2011

MOMMIE Knows Best: Systematic Optimizations for Verifiable Distributed Algorithms.
Proceedings of the 13th Workshop on Hot Topics in Operating Systems, 2011

Optimal Verification of Operations on Dynamic Sets.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2010
Applications of Parameterized st-Orientations.
J. Graph Algorithms Appl., 2010

Corrigendum: On the initialization methods of an exterior point algorithm for the assignment problem.
Int. J. Comput. Math., 2010

On the initialization methods of an exterior point algorithm for the assignment problem.
Int. J. Comput. Math., 2010

Optimal Verification of Operations on Dynamic Sets.
IACR Cryptology ePrint Archive, 2010

Optimal Authenticated Data Structures with Multilinear Forms.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

2009
Cryptographic Accumulators for Authenticated Hash Tables.
IACR Cryptology ePrint Archive, 2009

Dynamic provable data possession.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Algorithms for computing a parameterized st-orientation.
Theor. Comput. Sci., 2008

Distortion lower bounds for line embeddings.
Inf. Process. Lett., 2008

Dynamic Provable Data Possession.
IACR Cryptology ePrint Archive, 2008

Worst case examples of an exterior point algorithm for the assignment problem.
Discrete Optimization, 2008

Effective Visualization of File System Access-Control.
Proceedings of the Visualization for Computer Security, 5th International Workshop, 2008

Efficient integrity checking of untrusted network storage.
Proceedings of the 2008 ACM Workshop On Storage Security And Survivability, 2008

Athos: Efficient Authentication of Outsourced File Systems.
Proceedings of the Information Security, 11th International Conference, 2008

Graph Drawing for Security Visualization.
Proceedings of the Graph Drawing, 16th International Symposium, GD 2008, Heraklion, Crete, 2008

Authenticated hash tables.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

Algorithms for Location Estimation Based on RSSI Sampling.
Proceedings of the Algorithmic Aspects of Wireless Sensor Networks, 2008

2007
On the Cost of Persistence and Authentication in Skip Lists.
Proceedings of the Experimental Algorithms, 6th International Workshop, 2007

Time and Space Efficient Algorithms for Two-Party Authenticated Data Structures.
Proceedings of the Information and Communications Security, 9th International Conference, 2007

2006
Parameterized st -Orientations of Graphs: Algorithms and Experiments.
Proceedings of the Graph Drawing, 14th International Symposium, GD 2006, Karlsruhe, 2006

2005
Applications of Parameterized st-Orientations in Graph Drawing Algorithms.
Proceedings of the Graph Drawing, 13th International Symposium, 2005

2004
Computational experience with exterior point algorithms for the transportation problem.
Applied Mathematics and Computation, 2004

3D Visualization of Semantic Metadata Models and Ontologies.
Proceedings of the Graph Drawing, 12th International Symposium, 2004

2003
A visualization of the primal simplex algorithm for the assignment problem.
Proceedings of the 8th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, 2003


  Loading...