Karim M. El Defrawy
Orcid: 0000-0002-4008-0047Affiliations:
- University of California, Irvine, USA
According to our database1,
Karim M. El Defrawy
authored at least 71 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on ics.uci.edu
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
2023
Standard Model Time-Lock Puzzles: Defining Security and Constructing via Composition.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Boosting the Performance of High-Assurance Cryptography: Parallel Execution and Optimizing Memory Access in Formally-Verified Line-Point Zero-Knowledge.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
CraterLake: a hardware accelerator for efficient unbounded computation on encrypted data.
Proceedings of the ISCA '22: The 49th Annual International Symposium on Computer Architecture, New York, New York, USA, June 18, 2022
In-App Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head.
IACR Cryptol. ePrint Arch., 2021
F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption (Extended Version).
CoRR, 2021
Machine-checked ZKP for NP-relations: Formally Verified Security Proofs and Implementations of MPC-in-the-Head.
CoRR, 2021
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2021
2020
Communication-Efficient (Proactive) Secure Computation for Dynamic General Adversary Structures and Dynamic Groups.
IACR Cryptol. ePrint Arch., 2020
Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables: Extended Version.
CoRR, 2020
APEX: A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise.
Proceedings of the 29th USENIX Security Symposium, 2020
Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables.
Proceedings of the Applied Cryptography and Network Security, 2020
2019
A High-Assurance, Automatically-Synthesized, Evaluator for Machine-Checked (Proactively) Secure Multi-Party Computation.
IACR Cryptol. ePrint Arch., 2019
Communication-Efficient Proactive Secret Sharing for Dynamic Groups with Dishonest Majorities.
IACR Cryptol. ePrint Arch., 2019
SNUSE: A secure computation approach for large-scale user re-enrollment in biometric authentication systems.
Future Gener. Comput. Syst., 2019
A Verified Architecture for Proofs of Execution on Remote Devices under Full Software Compromise.
CoRR, 2019
Advancing remote attestation via computer-aided formal verification of designs and synthesis of executables: opinion.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
PURE: Using Verified Remote Attestation to Obtain Proofs of Update, Reset and Erasure in low-End Embedded Systems.
Proceedings of the International Conference on Computer-Aided Design, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the 2018 IEEE International Conference on Cloud Engineering, 2018
Proceedings of the 55th Annual Design Automation Conference, 2018
Secure Non-interactive User Re-enrollment in Biometrics-Based Identification and Authentication Systems.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018
Temporal Consistency of Integrity-Ensuring Computations and Applications to Embedded Systems Security.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Theoretical Foundations for Mobile Target Defense: Proactive Secret Sharing and Secure Multiparty Computation.
Proceedings of the From Database to Cyber Security, 2018
2017
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the ACM Symposium on Principles of Distributed Computing, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
FUsing Hybrid Remote Attestation with a Formally Verified Microkernel: Lessons Learned.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing, 2016
Automated Inference of Dependencies of Network Services and Applications via Transfer Entropy.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
2015
IACR Cryptol. ePrint Arch., 2015
2014
Disincentivizing/Incentivizing Malicious/Honest Behavior on the Internet via Privacy-Preserving Appcoins.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Pers. Ubiquitous Comput., 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
2012
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
2011
IEEE Trans. Mob. Comput., 2011
IEEE J. Sel. Areas Commun., 2011
Proceedings of the Trust and Trustworthy Computing - 4th International Conference, 2011
2010
Proceedings of the Third ACM Conference on Wireless Network Security, 2010
2009
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
2008
Proceedings of the 16th annual IEEE International Conference on Network Protocols, 2008
2007
Proceedings of the 3rd Workshop on Steps to Reducing Unwanted Traffic on the Internet, 2007
Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking, 2007
2006
Proposal for a cross-layer coordination framework for next generation wireless systems.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006