Paul Grubbs

According to our database1, Paul Grubbs authored at least 29 papers between 2013 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Learned-Database Systems Security.
Trans. Mach. Learn. Res., 2025

Efficient Proofs of Possession for Legacy Signatures.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

ALPACA: Anonymous Blocklisting with Constant-Sized Updatable Proofs.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

2024
Zombie: Middleboxes that Don't Snoop.
Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation, 2024

2023
Interoperability in End-to-End Encrypted Messaging.
IACR Cryptol. ePrint Arch., 2023

Weak Fiat-Shamir Attacks on Modern Proof Systems.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Context Discovery and Commitment Attacks - How to Break CCM, EAX, SIV, and More.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Spartan and Bulletproofs are Simulation-Extractable (for Free!).
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Learned Systems Security.
CoRR, 2022

Zero-Knowledge Middleboxes.
Proceedings of the 31st USENIX Security Symposium, 2022

Anonymous, Robust Post-quantum Public Key Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Snapshot-Oblivious RAMs: Sub-logarithmic Efficiency for Short Transcripts.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Authenticated Encryption with Key Identification.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Partitioning Oracle Attacks.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Pancake: Frequency Smoothing for Encrypted Data Stores.
Proceedings of the 29th USENIX Security Symposium, 2020

2019
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
The Tao of Inference in Privacy-Protected Databases.
Proc. VLDB Endow., 2018

Fast Message Franking: From Invisible Salamanders to Encryptment.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Side-Channel Attacks on Shared Search Indexes.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Leakage-Abuse Attacks against Order-Revealing Encryption.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Why Your Encrypted Database Is Not Secure.
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 2017

Modifying an Enciphering Scheme After Deployment.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Message Franking via Committing Authenticated Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Breaking Web Applications Built On Top of Encrypted Data.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Leakage-Abuse Attacks Against Searchable Encryption.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Making encryption work in the cloud.
Netw. Secur., 2014

2013
GPU and CPU parallelization of honest-but-curious secure two-party computation.
Proceedings of the Annual Computer Security Applications Conference, 2013


  Loading...