Paul Grubbs

According to our database1, Paul Grubbs authored at least 26 papers between 2013 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Zombie: Middleboxes that Don't Snoop.
IACR Cryptol. ePrint Arch., 2023

Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More.
IACR Cryptol. ePrint Arch., 2023

Interoperability in End-to-End Encrypted Messaging.
IACR Cryptol. ePrint Arch., 2023

Weak Fiat-Shamir Attacks on Modern Proof Systems.
IACR Cryptol. ePrint Arch., 2023

Spartan and Bulletproofs are simulation-extractable (for free!).
IACR Cryptol. ePrint Arch., 2023

2022
Authenticated Encryption with Key Identification.
IACR Cryptol. ePrint Arch., 2022

Snapshot-Oblivious RAMs: Sub-Logarithmic Efficiency for Short Transcripts.
IACR Cryptol. ePrint Arch., 2022

Learned Systems Security.
CoRR, 2022

2021
Anonymous, Robust Post-Quantum Public Key Encryption.
IACR Cryptol. ePrint Arch., 2021

Zero-Knowledge Middleboxes.
IACR Cryptol. ePrint Arch., 2021

2020
Partitioning Oracle Attacks.
IACR Cryptol. ePrint Arch., 2020

PANCAKE: Frequency Smoothing for Encrypted Data Stores.
IACR Cryptol. ePrint Arch., 2020

2019
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption.
IACR Cryptol. ePrint Arch., 2019

Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks.
IACR Cryptol. ePrint Arch., 2019

Fast Message Franking: From Invisible Salamanders to Encryptment.
IACR Cryptol. ePrint Arch., 2019

2018
The Tao of Inference in Privacy-Protected Databases.
Proc. VLDB Endow., 2018

Pump up the Volume: Practical Database Reconstruction from Volume Leakage on Range Queries.
IACR Cryptol. ePrint Arch., 2018

2017
Modifying an Enciphering Scheme after Deployment.
IACR Cryptol. ePrint Arch., 2017

Why Your Encrypted Database Is Not Secure.
IACR Cryptol. ePrint Arch., 2017

Message Franking via Committing Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2017

Side-Channel Attacks on Shared Search Indexes.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

2016
Leakage-Abuse Attacks against Order-Revealing Encryption.
IACR Cryptol. ePrint Arch., 2016

Breaking Web Applications Built On Top of Encrypted Data.
IACR Cryptol. ePrint Arch., 2016

Leakage-Abuse Attacks Against Searchable Encryption.
IACR Cryptol. ePrint Arch., 2016

2014
Making encryption work in the cloud.
Netw. Secur., 2014

2013
GPU and CPU parallelization of honest-but-curious secure two-party computation.
Proceedings of the Annual Computer Security Applications Conference, 2013


  Loading...