Matthew Green

Orcid: 0000-0002-6143-0683

Affiliations:
  • Johns Hopkins University, Baltimore, MD, USA


According to our database1, Matthew Green authored at least 88 papers between 2000 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Time-Deniable Signatures.
Proc. Priv. Enhancing Technol., July, 2023

Efficient Proofs of Software Exploitability for Real-world Processors.
Proc. Priv. Enhancing Technol., January, 2023

On the Possibility of a Backdoor in the Micali-Schnorr Generator.
IACR Cryptol. ePrint Arch., 2023

SoK: Privacy-Preserving Signatures.
IACR Cryptol. ePrint Arch., 2023

Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem.
IACR Cryptol. ePrint Arch., 2023

McFIL: Model Counting Functionality-Inherent Leakage.
Proceedings of the 32nd USENIX Security Symposium, 2023

Squint Hard Enough: Attacking Perceptual Hashing with Adversarial Machine Learning.
Proceedings of the 32nd USENIX Security Symposium, 2023

Efficient Set Membership Encryption and Applications.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
SoK: Cryptographic Confidentiality of Data on Mobile Devices.
Proc. Priv. Enhancing Technol., 2022

Efficient Set Membership Proofs using MPC-in-the-Head.
Proc. Priv. Enhancing Technol., 2022

Algorithm-Substitution Attacks on Cryptographic Puzzles.
IACR Cryptol. ePrint Arch., 2022

One-Time Programs from Commodity Hardware.
IACR Cryptol. ePrint Arch., 2022

Stacking Sigmas: A Framework to Compose $\varSigma $-Protocols for Disjunctions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2021
Squint Hard Enough: Evaluating Perceptual Hashing with Machine Learning.
IACR Cryptol. ePrint Arch., 2021

Meteor: Cryptographically Secure Steganography for Realistic Distributions.
IACR Cryptol. ePrint Arch., 2021

Stacking Sigmas: A Framework to Compose Σ-Protocols for Disjunctions.
IACR Cryptol. ePrint Arch., 2021

Fuzzy Message Detection.
IACR Cryptol. ePrint Arch., 2021

Abuse Resistant Law Enforcement Access Systems.
IACR Cryptol. ePrint Arch., 2021

Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions.
CoRR, 2021

KeyForge: Non-Attributable Email from Forward-Forgeable Signatures.
Proceedings of the 30th USENIX Security Symposium, 2021

Cost-Effective Mission Assurance Engineering Through Simulation.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2021

2020
Fluid MPC: Secure Multiparty Computation with Dynamic Participants.
IACR Cryptol. ePrint Arch., 2020

Automating the Development of Chosen Ciphertext Attacks.
Proceedings of the 29th USENIX Security Symposium, 2020

Mission Assurance for Autonomous Undersea Vehicles.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

2019
KeyForge: Mitigating Email Breaches with Forward-Forgeable Signatures.
IACR Cryptol. ePrint Arch., 2019

Using SMT Solvers to Automate Chosen Ciphertext Attacks.
IACR Cryptol. ePrint Arch., 2019

Imperfect forward secrecy: how Diffie-Hellman fails in practice.
Commun. ACM, 2019

Giving State to the Stateless: Augmenting Trustworthy Computation with Ledgers.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Zexe: Enabling Decentralized Private Computation.
IACR Cryptol. ePrint Arch., 2018

Where did I leave my keys?: lessons from the Juniper Dual EC incident.
Commun. ACM, 2018

Don't Talk to Strangers - On the Challenges of Intelligent Vehicle Authentication.
Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems, 2018

How to Squeeze a Crowd: Reducing Bandwidth in Mixing Cryptocurrencies.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops, 2018

Practical State Recovery Attacks against Legacy RNG Implementations.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Managing Secrets with Consensus Networks: Fairness, Ransomware and Access Control.
IACR Cryptol. ePrint Arch., 2017

Fairness in an Unfair World: Fair Multiparty Computation from public Bulletin Boards.
IACR Cryptol. ePrint Arch., 2017

A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK.
IACR Cryptol. ePrint Arch., 2017

Outsourcing Medical Dataset Analysis: A Possible Solution.
Proceedings of the Financial Cryptography and Data Security, 2017

Verified Correctness and Security of mbedTLS HMAC-DRBG.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Developers are Not the Enemy!: The Need for Usable Security APIs.
IEEE Secur. Priv., 2016

Bolt: Anonymous Payment Channels for Decentralized Currencies.
IACR Cryptol. ePrint Arch., 2016

Accountable Privacy for Decentralized Anonymous Payments.
IACR Cryptol. ePrint Arch., 2016

Decentralized Anonymous Micropayments.
IACR Cryptol. ePrint Arch., 2016

A Systematic Analysis of the Juniper Dual EC Incident.
IACR Cryptol. ePrint Arch., 2016

Downgrade Resilience in Key-Exchange Protocols.
IACR Cryptol. ePrint Arch., 2016

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage.
Proceedings of the 25th USENIX Security Symposium, 2016

Keynote: On Subverting Trust.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

A Systematic Analysis of the Juniper Dual EC Incident.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

A Protocol for Privately Reporting Ad Impressions at Scale.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Keys under doormats: mandating insecurity by requiring government access to all data and communications.
J. Cybersecur., 2015

Keys under doormats.
Commun. ACM, 2015

Forward Secure Asynchronous Messaging from Puncturable Encryption.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

2014
Automated Analysis and Synthesis of Block-Cipher Modes of Operation.
IACR Cryptol. ePrint Arch., 2014

A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2014

Zerocash: Decentralized Anonymous Payments from Bitcoin.
IACR Cryptol. ePrint Arch., 2014

On the Practical Exploitability of Dual EC in TLS Implementations.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
Charm: a framework for rapidly prototyping cryptosystems.
J. Cryptogr. Eng., 2013

The Threat in the Cloud.
IEEE Secur. Priv., 2013

Decentralized Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2013

Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes.
IACR Cryptol. ePrint Arch., 2013

Zerocoin: Anonymous Distributed E-Cash from Bitcoin.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Using SMT solvers to automate design tasks for encryption and signature schemes.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Vis-à-vis Cryptography: Private and Trustworthy In-Person Certifications.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

New Definitions and Separations for Circular Security.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

2011
Access controls for oblivious and anonymous systems.
ACM Trans. Inf. Syst. Secur., 2011

Secure Blind Decryption.
IACR Cryptol. ePrint Arch., 2011

Charm: A framework for Rapidly Prototyping Cryptosystems.
IACR Cryptol. ePrint Arch., 2011

A Research Roadmap for Healthcare IT Security Inspired by the PCAST Health Information Technology Report.
Proceedings of the 2nd USENIX Workshop on Health Security and Privacy, 2011

Outsourcing the Decryption of ABE Ciphertexts.
Proceedings of the 20th USENIX Security Symposium, 2011

Securing electronic medical records using attribute-based encryption on mobile devices.
Proceedings of the SPSM'11, 2011

2010
CPA and CCA-Secure Encryption Systems that are not 2-Circular Secure.
IACR Cryptol. ePrint Arch., 2010

Practical Adaptive Oblivious Transfer from Simple Assumptions.
IACR Cryptol. ePrint Arch., 2010

Self-Protecting Electronic Medical Records Using Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2010

Synchronized Aggregate Signatures: New Definitions, Constructions and Applications.
IACR Cryptol. ePrint Arch., 2010

2009
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials.
Proceedings of the Public Key Cryptography, 2009

2008
Universally Composable Adaptive Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2008

Practical Short Signature Batch Verification.
IACR Cryptol. ePrint Arch., 2008

2007
Blind Identity-Based Encryption and Simulatable Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2007

2006
Improved proxy re-encryption schemes with applications to secure distributed storage.
ACM Trans. Inf. Syst. Secur., 2006

Identity-Based Proxy Re-encryption.
IACR Cryptol. ePrint Arch., 2006

Security through legality.
Commun. ACM, 2006

2005
Correlation-Resistant Storage via Keyword-Searchable Encryption.
IACR Cryptol. ePrint Arch., 2005

Security Analysis of a Cryptographically-Enabled RFID Device.
Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31, 2005

2004
Selection of a time-varying quadratic Volterra model using a wavelet packet basis expansion.
IEEE Trans. Signal Process., 2004

2003
build.sh: Cross-building NetBSD.
Proceedings of BSDCon 2003, San Mateo, California, USA, September 8-12, 2003, 2003

2001
Enhanced Streaming Services in a Content Distribution Network.
IEEE Internet Comput., 2001

2000
Multiple hypothesis testing for time-varying nonlinear system identification.
Proceedings of the IEEE International Conference on Acoustics, 2000


  Loading...