Henry Corrigan-Gibbs
Orcid: 0009-0006-7577-4512
According to our database1,
Henry Corrigan-Gibbs
authored at least 47 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proc. Priv. Enhancing Technol., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Modular Verification of Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation.
Proceedings of the ACM SIGOPS 30th Symposium on Operating Systems Principles, 2024
2023
Accountable authentication with privacy protection: The Larch system for universal login.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023
Proceedings of the 22nd ACM Workshop on Hot Topics in Networks, 2023
2022
One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
2021
Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy.
Proceedings of the 30th USENIX Security Symposium, 2021
2020
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020
2019
IACR Cryptol. ePrint Arch., 2019
How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
Electron. Colloquium Comput. Complex., 2018
2017
Proceedings of the 26th Symposium on Operating Systems Principles, 2017
Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation, 2017
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 2017
2016
Stickler: Defending against Malicious Content Distribution Networks in an Unmodified Browser.
IEEE Secur. Priv., 2016
Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns.
IACR Cryptol. ePrint Arch., 2016
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015
Proceedings of the Second ACM Conference on Learning @ Scale, 2015
Recommendations for Randomness in the Operating System, or How to Keep Evil Children out of Your Pool and Other Random Facts.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015
2014
ACM Trans. Inf. Syst. Secur., 2014
IACR Cryptol. ePrint Arch., 2014
2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the Annual Symposium on Computing for Development, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012
2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010