Christina Garman

Orcid: 0009-0006-5077-5404

According to our database1, Christina Garman authored at least 24 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SoK: SGX.Fail: How Stuff Gets eXposed.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024

SNARKProbe: An Automated Security Analysis Framework for zkSNARK Implementations.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Provably Avoiding Geographic Regions for Tor's Onion Services.
Proceedings of the Financial Cryptography and Data Security, 2023

2022
ttzk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure.
IACR Cryptol. ePrint Arch., 2022

Honest Majority Multi-Prover Interactive Arguments.
IACR Cryptol. ePrint Arch., 2022

2021
Bento: safely bringing network function virtualization to Tor.
Proceedings of the ACM SIGCOMM 2021 Conference, Virtual Event, USA, August 23-27, 2021., 2021


2020
HACCLE: An Ecosystem for Building Secure Multi-Party Computations.
CoRR, 2020

Achieving Keyless CDNs with Conclaves.
Proceedings of the 29th USENIX Security Symposium, 2020

Bento: Bringing Network Function Virtualization to Tor.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2018
Where did I leave my keys?: lessons from the Juniper Dual EC incident.
Commun. ACM, 2018

2016
Accountable Privacy for Decentralized Anonymous Payments.
IACR Cryptol. ePrint Arch., 2016

A Systematic Analysis of the Juniper Dual EC Incident.
IACR Cryptol. ePrint Arch., 2016

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage.
Proceedings of the 25th USENIX Security Symposium, 2016

A Systematic Analysis of the Juniper Dual EC Incident.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes.
IACR Cryptol. ePrint Arch., 2015

Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS.
Proceedings of the 24th USENIX Security Symposium, 2015

2014
Zerocash: Decentralized Anonymous Payments from Bitcoin.
IACR Cryptol. ePrint Arch., 2014

Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity.
Proceedings of the Financial Cryptography and Data Security, 2014

2013
Charm: a framework for rapidly prototyping cryptosystems.
J. Cryptogr. Eng., 2013

Decentralized Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2013

Zerocoin: Anonymous Distributed E-Cash from Bitcoin.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013


  Loading...