Leakage-abuse attacks against searchable encryption D Cash, P Grubbs, J Perry, T Ristenpart Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015 | 700 | 2015 |
Leakage-abuse attacks against order-revealing encryption P Grubbs, K Sekniqi, V Bindschaedler, M Naveed, T Ristenpart 2017 IEEE symposium on security and privacy (SP), 655-672, 2017 | 249 | 2017 |
Pump up the volume: Practical database reconstruction from volume leakage on range queries P Grubbs, MS Lacharité, B Minaud, KG Paterson Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 167 | 2018 |
Learning to reconstruct: Statistical learning theory and encrypted database attacks P Grubbs, MS Lacharité, B Minaud, KG Paterson 2019 IEEE Symposium on Security and Privacy (SP), 1067-1083, 2019 | 140 | 2019 |
Breaking web applications built on top of encrypted data P Grubbs, R McPherson, M Naveed, T Ristenpart, V Shmatikov Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 121 | 2016 |
Message franking via committing authenticated encryption P Grubbs, J Lu, T Ristenpart Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017 | 106 | 2017 |
The tao of inference in privacy-protected databases V Bindschaedler, P Grubbs, D Cash, T Ristenpart, V Shmatikov Cryptology ePrint Archive, 2017 | 103 | 2017 |
Why Your Encrypted Database Is Not Secure P Grubbs, T Ristenpart, V Shmatikov Hot Topics in Operating Systems, 2017 | 100 | 2017 |
Fast message franking: From invisible salamanders to encryptment Y Dodis, P Grubbs, T Ristenpart, J Woodage Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 98 | 2018 |
Pancake: Frequency smoothing for encrypted data stores P Grubbs, A Khandelwal, MS Lacharité, L Brown, L Li, R Agarwal, ... 29th USENIX Security Symposium (USENIX Security 20), 2451-2468, 2020 | 69 | 2020 |
GPU and CPU parallelization of honest-but-curious secure two-party computation N Husted, S Myers, A Shelat, P Grubbs Proceedings of the 29th Annual Computer Security Applications Conference …, 2013 | 57 | 2013 |
Partitioning oracle attacks J Len, P Grubbs, T Ristenpart 30th USENIX security symposium (USENIX Security 21), 195-212, 2021 | 46 | 2021 |
Encryption in the cloud using enterprise managed keys K Narayan, P Grubbs US Patent 9,413,730, 2016 | 44 | 2016 |
Asymmetric message franking: Content moderation for metadata-private end-to-end encryption N Tyagi, P Grubbs, J Len, I Miers, T Ristenpart Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 41 | 2019 |
Anonymous, robust post-quantum public key encryption P Grubbs, V Maram, KG Paterson Annual International Conference on the Theory and Applications of …, 2022 | 35 | 2022 |
{Zero-Knowledge} middleboxes P Grubbs, A Arun, Y Zhang, J Bonneau, M Walfish 31st USENIX Security Symposium (USENIX Security 22), 4255-4272, 2022 | 31 | 2022 |
Searchable encryption for cloud storage S Sarukkai, K Narayan, R Gupta, P Grubbs US Patent 9,454,673, 2016 | 22 | 2016 |
Wildcard search in encrypted text using order preserving encryption P Grubbs US Patent 9,760,637, 2017 | 18 | 2017 |
Spartan and bulletproofs are simulation-extractable (for free!) Q Dao, P Grubbs Annual International Conference on the Theory and Applications of …, 2023 | 14 | 2023 |
Weak fiat-shamir attacks on modern proof systems Q Dao, J Miller, O Wright, P Grubbs 2023 IEEE Symposium on Security and Privacy (SP), 199-216, 2023 | 13 | 2023 |