Karim M. El Defrawy

Orcid: 0000-0002-4008-0047

Affiliations:
  • University of California, Irvine, USA


According to our database1, Karim M. El Defrawy authored at least 71 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Challenges in Timed Cryptography: A Position Paper.
IACR Cryptol. ePrint Arch., 2024

Composing Timed Cryptographic Protocols: Foundations and Applications.
IACR Cryptol. ePrint Arch., 2024

2023
Standard Model Time-Lock Puzzles: Defining Security and Constructing via Composition.
IACR Cryptol. ePrint Arch., 2023

On the Hardness of Scheme-Switching Between SIMD FHE Schemes.
IACR Cryptol. ePrint Arch., 2023

Boosting the Performance of High-Assurance Cryptography: Parallel Execution and Optimizing Memory Access in Formally-Verified Line-Point Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2023

Entanglement-based Mutual Quantum Distance Bounding.
CoRR, 2023

Traffic Analysis by Adversaries with Partial Visibility.
Proceedings of the Computer Security - ESORICS 2023, 2023

Short Concurrent Covert Authenticated Key Exchange (Short cAKE).
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications.
IACR Cryptol. ePrint Arch., 2022

The Key Lattice Framework for Concurrent Group Messaging.
IACR Cryptol. ePrint Arch., 2022

CraterLake: a hardware accelerator for efficient unbounded computation on encrypted data.
Proceedings of the ISCA '22: The 49th Annual International Symposium on Computer Architecture, New York, New York, USA, June 18, 2022

In-App Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

2021
How Byzantine is a Send Corruption?
IACR Cryptol. ePrint Arch., 2021

Communication-Efficient Proactive MPC for Dynamic Groups with Dishonest Majorities.
IACR Cryptol. ePrint Arch., 2021

Optimizing Registration Based Encryption.
IACR Cryptol. ePrint Arch., 2021

Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head.
IACR Cryptol. ePrint Arch., 2021

F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption (Extended Version).
CoRR, 2021

Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head.
CoRR, 2021

Quantum Optimization Heuristics with an Application to Knapsack Problems.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2021

2020
Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups.
IACR Cryptol. ePrint Arch., 2020

Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables: Extended Version.
CoRR, 2020

APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise.
Proceedings of the 29th USENIX Security Symposium, 2020

Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
A High-Assurance, Automatically-Synthesized, Evaluator for Machine-Checked (Proactively) Secure Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2019

Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities.
IACR Cryptol. ePrint Arch., 2019

SNUSE: A secure computation approach for large-scale user re-enrollment in biometric authentication systems.
Future Gener. Comput. Syst., 2019

A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise.
CoRR, 2019

Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables: opinion.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

VRASED: A Verified Hardware/Software Co-Design for Remote Attestation.
Proceedings of the 28th USENIX Security Symposium, 2019

PURE: Using Verified Remote Attestation to Obtain Proofs of Update, Reset and Erasure in low-End Embedded Systems.
Proceedings of the International Conference on Computer-Aided Design, 2019

A High-Assurance Evaluator for Machine-Checked Secure Multiparty Computation.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Longitudinal Analysis of Misuse of Bitcoin.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Formally Verified Hardware/Software Co-Design for Remote Attestation.
CoRR, 2018

Proactive Secure Multiparty Computation with a Dishonest Majority.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

BlockCIS - A Blockchain-Based Cyber Insurance System.
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018

Reconciling remote attestation and safety-critical operation on simple IoT devices.
Proceedings of the 55th Annual Design Automation Conference, 2018

Secure Non-interactive User Re-enrollment in Biometrics-Based Identification and Authentication Systems.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018

Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation.
Proceedings of the From Database to Cyber Security, 2018

2017
Efficient, Reusable Fuzzy Extractors from LWE.
IACR Cryptol. ePrint Arch., 2017

HYDRA: hybrid design for remote attestation (using a formally verified microkernel).
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

Brief Announcement: Secure Self-Stabilizing Computation.
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017

Proactively Secure Cloud-Enabled Storage.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

FUsing Hybrid Remote Attestation with a Formally Verified Microkernel: Lessons Learned.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017

Lightweight Swarm Attestation: A Tale of Two LISA-s.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Proactive Secret Sharing with a Dishonest Majority.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Brief Announcement: Proactive Secret Sharing with a Dishonest Majority.
Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, 2016

Automated Inference of Dependencies of Network Services and Applications via Transfer Entropy.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Byzantine Fault Tolerant Software-Defined Networking (SDN) Controllers.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

2015
Communication-Optimal Proactive Secret Sharing for Dynamic Groups.
IACR Cryptol. ePrint Arch., 2015

2014
Disincentivizing/Incentivizing Malicious/Honest Behavior on the Internet via Privacy-Preserving Appcoins.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014

Founding Digital Currency on Secure Computation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Agent societies and social networks for ubiquitous computing.
Pers. Ubiquitous Comput., 2013

5PM: Secure pattern matching.
J. Comput. Secur., 2013

How to Withstand Mobile Virus Attacks, Revisited.
IACR Cryptol. ePrint Arch., 2013

Blindfolded Data Search via Secure Pattern Matching.
Computer, 2013

Neighborhood watch: On network coding throughput and key sharing.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Harvesting SSL Certificate Data to Identify Web-Fraud.
Int. J. Netw. Secur., 2012

SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs.
IEEE Trans. Mob. Comput., 2011

Privacy-Preserving Location-Based On-Demand Routing in MANETs.
IEEE J. Sel. Areas Commun., 2011

Group Distance Bounding Protocols - (Short Paper).
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011

2010
GDB: Group Distance Bounding Protocols
CoRR, 2010

Attacks on physical-layer identification.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

2009
Harvesting SSL Certificate Data to Mitigate Web-Fraud
CoRR, 2009

Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
PRISM: Privacy-friendly routing in suspicious MANETs (and VANETs).
Proceedings of the 16th annual IEEE International Conference on Network Protocols, 2008

2007
BotTorrent: Misusing BitTorrent to Launch DDoS Attacks.
Proceedings of the 3rd Workshop on Steps to Reducing Unwanted Traffic on the Internet, 2007

Incentive-based cooperative and secure inter-personal networking.
Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking, 2007

2006
Optimal Filtering for DDoS Attacks
CoRR, 2006

Proposal for a cross-layer coordination framework for next generation wireless systems.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006


  Loading...