Henry Corrigan-Gibbs

Orcid: 0009-0006-7577-4512

According to our database1, Henry Corrigan-Gibbs authored at least 42 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Private Web Search with Tiptoe.
IACR Cryptol. ePrint Arch., 2023

The One-Wayness of Jacobi Signatures.
IACR Cryptol. ePrint Arch., 2023

Authenticated private information retrieval.
IACR Cryptol. ePrint Arch., 2023

Arithmetic Sketching.
IACR Cryptol. ePrint Arch., 2023

Accountable authentication with privacy protection: The Larch system for universal login.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023

Lightweb: Private web browsing without all the baggage.
Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, 2023

2022
One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval.
IACR Cryptol. ePrint Arch., 2022

Single-Server Private Information Retrieval with Sublinear Amortized Time.
IACR Cryptol. ePrint Arch., 2022

2021
Private Blocklist Lookups with Checklist.
IACR Cryptol. ePrint Arch., 2021

Lightweight Techniques for Private Heavy Hitters.
IACR Cryptol. ePrint Arch., 2021

Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
SafetyPin: Encrypted Backups with Human-Memorable Secrets.
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020

2019
Protecting privacy by splitting trust.
PhD thesis, 2019

Private Information Retrieval with Sublinear Online Time.
IACR Cryptol. ePrint Arch., 2019

How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs.
IACR Cryptol. ePrint Arch., 2019

True2F: Backdoor-Resistant Authentication Tokens.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
The Function-Inversion Problem: Barriers and Opportunities.
Electron. Colloquium Comput. Complex., 2018

2017
The Discrete-Logarithm Problem with Preprocessing.
IACR Cryptol. ePrint Arch., 2017

Atom: Horizontally Scaling Strong Anonymity.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

Prio: Private, Robust, and Scalable Computation of Aggregate Statistics.
Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, 2017

Trust but Verify: Auditing the Secure Internet of Things.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Quantum Operating Systems.
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 2017

2016
Stickler: Defending against Malicious Content Distribution Networks in an Unmodified Browser.
IEEE Secur. Priv., 2016

Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns.
IACR Cryptol. ePrint Arch., 2016

Atom: Scalable Anonymity Resistant to Traffic Analysis.
CoRR, 2016

Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Deterring Cheating in Online Environments.
ACM Trans. Comput. Hum. Interact., 2015

Stickler: Defending Against Malicious CDNs in an Unmodified Browser.
CoRR, 2015

Riposte: An Anonymous Messaging System Handling Millions of Users.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Measuring and Maximizing the Effectiveness of Honor Codes in Online Courses.
Proceedings of the Second ACM Conference on Learning @ Scale, 2015

Recommendations for Randomness in the Operating System, or How to Keep Evil Children out of Your Pool and Other Random Facts.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

2014
Security Analysis of Accountable Anonymity in Dissent.
ACM Trans. Inf. Syst. Secur., 2014

Bivariate Polynomials Modulo Composites and their Applications.
IACR Cryptol. ePrint Arch., 2014

FlashPatch: Spreading Software Updates over Flash Drives in Under-connected Regions.
Proceedings of the Fifth ACM Symposium on Computing for Development, 2014

2013
Conscript your friends into larger anonymity sets with JavaScript.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Proactively Accountable Anonymous Messaging in Verdict.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Ensuring high-quality randomness in cryptographic key generation.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Dining in the Sunshine: Verifiable Anonymous Communication with Verdict
CoRR, 2012

Dissent in Numbers: Making Strong Anonymity Scale.
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012

2010
Accountable Anonymous Group Messaging
CoRR, 2010

Dissent: accountable anonymous group messaging.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010


  Loading...