Henry Corrigan-Gibbs
Orcid: 0009-0006-7577-4512
According to our database1,
Henry Corrigan-Gibbs
authored at least 48 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Proceedings of the 34th USENIX Security Symposium, 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
2024
Proc. Priv. Enhancing Technol., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Modular Verification of Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation.
Proceedings of the ACM SIGOPS 30th Symposium on Operating Systems Principles, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
2023
One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 29th Symposium on Operating Systems Principles, 2023
Accountable authentication with privacy protection: The Larch system for universal login.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023
Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, 2023
2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
2020
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
2019
How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Theory of Cryptography - 17th International Conference, 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
2017
Proceedings of the 26th Symposium on Operating Systems Principles, 2017
Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, 2017
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 2017
2016
Stickler: Defending against Malicious Content Distribution Networks in an Unmodified Browser.
IEEE Secur. Priv., 2016
Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns.
IACR Cryptol. ePrint Arch., 2016
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Second ACM Conference on Learning @ Scale, 2015
Recommendations for Randomness in the Operating System, or How to Keep Evil Children out of Your Pool and Other Random Facts.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015
2014
ACM Trans. Inf. Syst. Secur., 2014
Proceedings of the Fifth ACM Symposium on Computing for Development, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012
2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010