Seny Kamara

According to our database1, Seny Kamara authored at least 61 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MAPLE: MArkov Process Leakage attacks on Encrypted Search.
Proc. Priv. Enhancing Technol., January, 2024

2023
Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Encrypted Search.
IACR Cryptol. ePrint Arch., 2023

Injection-Secure Structured and Searchable Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2023

2022
Outside Looking In: Approaches to Content Moderation in End-to-End Encrypted Systems.
CoRR, 2022

Encrypted Distributed Systems.
Proceedings of the PODC '22: ACM Symposium on Principles of Distributed Computing, Salerno, Italy, July 25, 2022

SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

2021
A Decentralized and Encrypted National Gun Registry.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data.
IACR Cryptol. ePrint Arch., 2021

Algorithms for the People.
Proceedings of the Formal Methods in Computer Aided Design, 2021

Structured Encryption and Dynamic Leakage Suppression.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Encrypted Databases: From Theory to Systems.
Proceedings of the 11th Conference on Innovative Data Systems Research, 2021

Efficient Graph Encryption Scheme for Shortest Path Queries.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
An Optimal Relational Database Encryption Scheme.
IACR Cryptol. ePrint Arch., 2020

Adversarial Level Agreements for Two-Party Protocols.
IACR Cryptol. ePrint Arch., 2020

Encrypted Blockchain Databases.
IACR Cryptol. ePrint Arch., 2020

Encrypted Key-Value Stores.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Towards Untrusted Social Video Verification to Combat Deepfakes via Face Geometry Consistency.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

2019
Breach-Resistant Structured Encryption.
Proc. Priv. Enhancing Technol., 2019

Encrypted Databases for Differential Privacy.
Proc. Priv. Enhancing Technol., 2019

Revisiting Leakage Abuse Attacks.
IACR Cryptol. ePrint Arch., 2019

Encrypted Distributed Hash Tables.
IACR Cryptol. ePrint Arch., 2019

Forward and Backward Private Searchable Encryption with SGX.
Proceedings of the 12th European Workshop on Systems Security, 2019

Computationally Volume-Hiding Structured Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

2018
Structured Encryption and Leakage Suppression.
IACR Cryptol. ePrint Arch., 2018

Encrypted Multi-Maps with Computationally-Secure Leakage.
IACR Cryptol. ePrint Arch., 2018

DogFish: Decentralized Optimistic Game-theoretic FIle SHaring.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity.
IACR Cryptol. ePrint Arch., 2017

2016
SQL on Structurally-Encrypted Databases.
IACR Cryptol. ePrint Arch., 2016

2015
GRECS: Graph Encryption for Approximate Shortest Distance Queries.
IACR Cryptol. ePrint Arch., 2015

Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage.
IACR Cryptol. ePrint Arch., 2015

Encrypted Search.
XRDS, 2015

Inference Attacks on Property-Preserving Encrypted Databases.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Co-Location-Resistant Clouds.
IACR Cryptol. ePrint Arch., 2014

Scaling Private Set Intersection to Billion-Element Sets.
Proceedings of the Financial Cryptography and Data Security, 2014

Restructuring the NSA Metadata Program.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
Inspection-Resistant Memory Architectures.
IEEE Micro, 2013

Parallel and Dynamic Searchable Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2013

Tight bounds for online vector bin packing.
Proceedings of the Symposium on Theory of Computing Conference, 2013

Garbled Circuits via Structured Encryption.
Proceedings of the Financial Cryptography and Data Security, 2013

Proofs of Storage: Theory, Constructions and Applications.
Proceedings of the Algebraic Informatics - 5th International Conference, 2013

2012
Dynamic Searchable Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2012

Salus: A System for Server-Aided Secure Function Evaluation.
IACR Cryptol. ePrint Arch., 2012

Inspection resistant memory: Architectural support for security from physical examination.
Proceedings of the 39th International Symposium on Computer Architecture (ISCA 2012), 2012

4th cloud computing security workshop (CCSW 2012).
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Parallel Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2011

Outsourcing Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2011

Structured Encryption and Controlled Disclosure.
IACR Cryptol. ePrint Arch., 2011

2010
Cryptographic Cloud Storage.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
Proofs of Storage from Homomorphic Identification Protocols.
Proceedings of the Advances in Cryptology, 2009

2008
The Practical Subtleties of Biometric Key Generation.
Proceedings of the 17th USENIX Security Symposium, 2008

How to Encrypt with a Malicious Random Number Generator.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

Towards practical biometric key generation with randomized biometric templates.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2006
Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions.
IACR Cryptol. ePrint Arch., 2006

A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks.
Proceedings of the Second Workshop on Cryptography for Ad-hoc Networks, 2006

Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage.
Proceedings of the Network and Distributed System Security Symposium, 2006

2005
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage.
IACR Cryptol. ePrint Arch., 2005

Achieving Efficient Conjunctive Keyword Searches over Encrypted Data.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Secret locking: Exploring new approaches to biometric key encapsulation.
Proceedings of the ICETE 2005, 2005

An Extensible Platform for Evaluating Security Protocols.
Proceedings of the Proceedings 38th Annual Simulation Symposium (ANSS-38 2005), 2005

2003
Analysis of vulnerabilities in Internet firewalls.
Comput. Secur., 2003

2002
ActiveSync, TCP/IP and 802.11b Wireless Vulnerabilities of WinCE-Based PDAs.
Proceedings of the 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 2002


  Loading...