Tracking certificate misissuance in the wild D Kumar, Z Wang, M Hyder, J Dickinson, G Beck, D Adrian, J Mason, ... 2018 IEEE Symposium on Security and Privacy (SP), 785-798, 2018 | 110 | 2018 |
Order-C secure multiparty computation for highly repetitive circuits G Beck, A Goel, A Jain, G Kaptchuk Annual International Conference on the Theory and Applications of …, 2021 | 21 | 2021 |
Fuzzy message detection G Beck, J Len, I Miers, M Green Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 14 | 2021 |
Automating the development of chosen ciphertext attacks G Beck, M Zinkus, M Green 29th USENIX Security Symposium (USENIX Security 20), 1821-1837, 2020 | 12 | 2020 |
Time-deniable signatures G Beck, AR Choudhuri, M Green, A Jain, PR Tiwari Proceedings on Privacy Enhancing Technologies, 2023 | 4 | 2023 |
Scalable multiparty garbling G Beck, A Goel, A Hegde, A Jain, Z Jin, G Kaptchuk Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 2 | 2023 |
Abuse-resistant location tracking: Balancing privacy and safety in the offline finding ecosystem G Beck, H Eldridge, M Green, N Heninger, A Jain Cryptology ePrint Archive, 2023 | 2 | 2023 |
Using SMT Solvers to Automate Chosen Ciphertext Attacks G Beck, M Zinkus, M Green Cryptology ePrint Archive, 2019 | 2 | 2019 |
TOWARDS EFFICIENT METADATA-HIDING CRYPTOGRAPHY G Beck Johns Hopkins University, 2024 | | 2024 |
SocIoTy: Practical Cryptography in Smart Home Contexts TM Jois, G Beck, S Belikovetsky, J Carrigan, A Chator, L Kostick, M Zinkus, ... Proceedings on Privacy Enhancing Technologies, 2024 | | 2024 |
Pulsar: Secure Steganography through Diffusion Models TM Jois, G Beck, G Kaptchuk Cryptology ePrint Archive, 2023 | | 2023 |
Abuse-Resistant Location Tracking: Balancing Privacy and Safety in the Offline Finding Ecosystem H Eldridge, G Beck, M Green, N Heninger, A Jain | | |