Christina Garman

Orcid: 0009-0006-5077-5404

According to our database1, Christina Garman authored at least 28 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Improving the Performance and Security of Tor's Onion Services.
Proc. Priv. Enhancing Technol., 2025

ECC.fail: Mounting Rowhammer Attacks on DDR4 Servers with ECC Memory.
Proceedings of the 34th USENIX Security Symposium, 2025

WireTap: Breaking Server SGX via DRAM Bus Interposition.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
SoK: SGX.Fail: How Stuff Gets eXposed.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024

R+R: A Systematic Study of Cryptographic Function Identification Approaches in Binaries.
Proceedings of the Annual Computer Security Applications Conference, 2024

SNARKProbe: An Automated Security Analysis Framework for zkSNARK Implementations.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Provably Avoiding Geographic Regions for Tor's Onion Services.
Proceedings of the Financial Cryptography and Data Security, 2023

2022
ttzk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure.
IACR Cryptol. ePrint Arch., 2022

Honest Majority Multi-Prover Interactive Arguments.
IACR Cryptol. ePrint Arch., 2022

2021
Bento: safely bringing network function virtualization to Tor.
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021


2020
HACCLE: An Ecosystem for Building Secure Multi-Party Computations.
CoRR, 2020

Achieving Keyless CDNs with Conclaves.
Proceedings of the 29th USENIX Security Symposium, 2020

Bento: Bringing Network Function Virtualization to Tor.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2018
Where did I leave my keys?: lessons from the Juniper Dual EC incident.
Commun. ACM, 2018

2016
A Systematic Analysis of the Juniper Dual EC Incident.
IACR Cryptol. ePrint Arch., 2016

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage.
Proceedings of the 25th USENIX Security Symposium, 2016

Accountable Privacy for Decentralized Anonymous Payments.
Proceedings of the Financial Cryptography and Data Security, 2016

A Systematic Analysis of the Juniper Dual EC Incident.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS.
Proceedings of the 24th USENIX Security Symposium, 2015

Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Zerocash: Decentralized Anonymous Payments from Bitcoin.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Decentralized Anonymous Credentials.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
Charm: a framework for rapidly prototyping cryptosystems.
J. Cryptogr. Eng., 2013

Zerocoin: Anonymous Distributed E-Cash from Bitcoin.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013


  Loading...