default search action
Henry Corrigan-Gibbs
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Kevin Liao, Henry Corrigan-Gibbs, Dan Boneh:
Divisible E-Cash for Billing in Private Ad Retargeting. Proc. Priv. Enhancing Technol. 2024(4): 5-23 (2024) - [c35]Henry Corrigan-Gibbs, David J. Wu:
The One-Wayness of Jacobi Signatures. CRYPTO (5) 2024: 3-13 - [c34]Anish Athalye, Henry Corrigan-Gibbs, M. Frans Kaashoek, Joseph Tassarotti, Nickolai Zeldovich:
Modular Verification of Secure and Leakage-Free Systems: From Application Specification to Circuit-Level Implementation. SOSP 2024: 655-672 - [c33]Mayank Rathee, Yuwen Zhang, Henry Corrigan-Gibbs, Raluca Ada Popa:
Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs. SP 2024: 3072-3090 - [i31]Mayank Rathee, Yuwen Zhang, Henry Corrigan-Gibbs, Raluca Ada Popa:
Private Analytics via Streaming, Sketching, and Silently Verifiable Proofs. IACR Cryptol. ePrint Arch. 2024: 666 (2024) - [i30]Henry Corrigan-Gibbs, David J. Wu:
Legendre Sequences are Pseudorandom under the Quadratic-Residuosity Assumption. IACR Cryptol. ePrint Arch. 2024: 1252 (2024) - [i29]Henry Corrigan-Gibbs, Alexandra Henzinger, Yael Kalai, Vinod Vaikuntanathan:
Somewhat Homomorphic Encryption from Linear Homomorphism and Sparse LPN. IACR Cryptol. ePrint Arch. 2024: 1760 (2024) - 2023
- [c32]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Arithmetic Sketching. CRYPTO (1) 2023: 171-202 - [c31]Emma Dauterman, Henry Corrigan-Gibbs:
Lightweb: Private web browsing without all the baggage. HotNets 2023: 287-294 - [c30]Emma Dauterman, Danny Lin, Henry Corrigan-Gibbs, David Mazières:
Accountable authentication with privacy protection: The Larch system for universal login. OSDI 2023: 81-98 - [c29]Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, Nickolai Zeldovich:
Private Web Search with Tiptoe. SOSP 2023: 396-416 - [c28]Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, Bryan Ford:
Authenticated private information retrieval. USENIX Security Symposium 2023: 3835-3851 - [c27]Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, Vinod Vaikuntanathan:
One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval. USENIX Security Symposium 2023: 3889-3905 - [i28]Emma Dauterman, Danny Lin, Henry Corrigan-Gibbs, David Mazières:
Accountable authentication with privacy protection: The Larch system for universal login. CoRR abs/2305.19241 (2023) - [i27]Simone Colombo, Kirill Nikitin, Henry Corrigan-Gibbs, David J. Wu, Bryan Ford:
Authenticated private information retrieval. IACR Cryptol. ePrint Arch. 2023: 297 (2023) - [i26]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Arithmetic Sketching. IACR Cryptol. ePrint Arch. 2023: 1012 (2023) - [i25]Alexandra Henzinger, Emma Dauterman, Henry Corrigan-Gibbs, Nickolai Zeldovich:
Private Web Search with Tiptoe. IACR Cryptol. ePrint Arch. 2023: 1438 (2023) - [i24]Henry Corrigan-Gibbs, David J. Wu:
The One-Wayness of Jacobi Signatures. IACR Cryptol. ePrint Arch. 2023: 1638 (2023) - 2022
- [c26]Henry Corrigan-Gibbs, Alexandra Henzinger, Dmitry Kogan:
Single-Server Private Information Retrieval with Sublinear Amortized Time. EUROCRYPT (2) 2022: 3-33 - [i23]Henry Corrigan-Gibbs, Alexandra Henzinger, Dmitry Kogan:
Single-Server Private Information Retrieval with Sublinear Amortized Time. IACR Cryptol. ePrint Arch. 2022: 81 (2022) - [i22]Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meiklejohn, Vinod Vaikuntanathan:
One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval. IACR Cryptol. ePrint Arch. 2022: 949 (2022) - 2021
- [c25]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Lightweight Techniques for Private Heavy Hitters. SP 2021: 762-776 - [c24]Dmitry Kogan, Henry Corrigan-Gibbs:
Private Blocklist Lookups with Checklist. USENIX Security Symposium 2021: 875-892 - [c23]Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, Dan Boneh:
Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy. USENIX Security Symposium 2021: 1775-1792 - [i21]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Lightweight Techniques for Private Heavy Hitters. IACR Cryptol. ePrint Arch. 2021: 17 (2021) - [i20]Dmitry Kogan, Henry Corrigan-Gibbs:
Private Blocklist Lookups with Checklist. IACR Cryptol. ePrint Arch. 2021: 345 (2021) - 2020
- [c22]Henry Corrigan-Gibbs, Dmitry Kogan:
Private Information Retrieval with Sublinear Online Time. EUROCRYPT (1) 2020: 44-75 - [c21]Emma Dauterman, Henry Corrigan-Gibbs, David Mazières:
SafetyPin: Encrypted Backups with Human-Memorable Secrets. OSDI 2020: 1121-1138 - [i19]Emma Dauterman, Henry Corrigan-Gibbs, David Mazières:
SafetyPin: Encrypted Backups with Human-Memorable Secrets. CoRR abs/2010.06712 (2020) - [i18]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Lightweight Techniques for Private Heavy Hitters. CoRR abs/2012.14884 (2020)
2010 – 2019
- 2019
- [b1]Henry Corrigan-Gibbs:
Protecting privacy by splitting trust. Stanford University, USA, 2019 - [c20]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs. CRYPTO (3) 2019: 67-97 - [c19]Emma Dauterman, Henry Corrigan-Gibbs, David Mazières, Dan Boneh, Dominic Rizzo:
True2F: Backdoor-Resistant Authentication Tokens. IEEE Symposium on Security and Privacy 2019: 398-416 - [c18]Henry Corrigan-Gibbs, Dmitry Kogan:
The Function-Inversion Problem: Barriers and Opportunities. TCC (1) 2019: 393-421 - [i17]Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, Dan Boneh:
Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy. CoRR abs/1911.09215 (2019) - [i16]Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai:
How to Prove a Secret: Zero-Knowledge Proofs on Distributed Data via Fully Linear PCPs. IACR Cryptol. ePrint Arch. 2019: 188 (2019) - [i15]Henry Corrigan-Gibbs, Dmitry Kogan:
The Function-Inversion Problem: Barriers and Opportunities. IACR Cryptol. ePrint Arch. 2019: 1046 (2019) - [i14]Henry Corrigan-Gibbs, Dmitry Kogan:
Private Information Retrieval with Sublinear Online Time. IACR Cryptol. ePrint Arch. 2019: 1075 (2019) - 2018
- [c17]Henry Corrigan-Gibbs, Dmitry Kogan:
The Discrete-Logarithm Problem with Preprocessing. EUROCRYPT (2) 2018: 415-447 - [i13]Emma Dauterman, Henry Corrigan-Gibbs, David Mazières, Dan Boneh, Dominic Rizzo:
True2F: Backdoor-resistant authentication tokens. CoRR abs/1810.04660 (2018) - [i12]Henry Corrigan-Gibbs, Dmitry Kogan:
The Function-Inversion Problem: Barriers and Opportunities. Electron. Colloquium Comput. Complex. TR18 (2018) - 2017
- [c16]Henry Corrigan-Gibbs, David J. Wu, Dan Boneh:
Quantum Operating Systems. HotOS 2017: 76-81 - [c15]Judson Wilson, Riad S. Wahby, Henry Corrigan-Gibbs, Dan Boneh, Philip Alexander Levis, Keith Winstein:
Trust but Verify: Auditing the Secure Internet of Things. MobiSys 2017: 464-474 - [c14]Henry Corrigan-Gibbs, Dan Boneh:
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics. NSDI 2017: 259-282 - [c13]Albert Kwon, Henry Corrigan-Gibbs, Srinivas Devadas, Bryan Ford:
Atom: Horizontally Scaling Strong Anonymity. SOSP 2017: 406-422 - [i11]Henry Corrigan-Gibbs, Dan Boneh:
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics. CoRR abs/1703.06255 (2017) - [i10]Henry Corrigan-Gibbs, Dmitry Kogan:
The Discrete-Logarithm Problem with Preprocessing. IACR Cryptol. ePrint Arch. 2017: 1113 (2017) - 2016
- [j3]Amit Levy, Henry Corrigan-Gibbs, Dan Boneh:
Stickler: Defending against Malicious Content Distribution Networks in an Unmodified Browser. IEEE Secur. Priv. 14(2): 22-28 (2016) - [c12]Dan Boneh, Henry Corrigan-Gibbs, Stuart E. Schechter:
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks. ASIACRYPT (1) 2016: 220-248 - [i9]Albert Kwon, Henry Corrigan-Gibbs, Srinivas Devadas, Bryan Ford:
Atom: Scalable Anonymity Resistant to Traffic Analysis. CoRR abs/1612.07841 (2016) - [i8]Henry Corrigan-Gibbs, Dan Boneh, Stuart E. Schechter:
Balloon Hashing: Provably Space-Hard Hash Functions with Data-Independent Access Patterns. IACR Cryptol. ePrint Arch. 2016: 27 (2016) - 2015
- [j2]Henry Corrigan-Gibbs, Nakull Gupta, Curtis G. Northcutt, Edward Cutrell, William Thies:
Deterring Cheating in Online Environments. ACM Trans. Comput. Hum. Interact. 22(6): 28:1-28:23 (2015) - [c11]Henry Corrigan-Gibbs, Suman Jana:
Recommendations for Randomness in the Operating System, or How to Keep Evil Children out of Your Pool and Other Random Facts. HotOS 2015 - [c10]Henry Corrigan-Gibbs, Nakull Gupta, Curtis G. Northcutt, Edward Cutrell, William Thies:
Measuring and Maximizing the Effectiveness of Honor Codes in Online Courses. L@S 2015: 223-228 - [c9]Henry Corrigan-Gibbs, Dan Boneh, David Mazières:
Riposte: An Anonymous Messaging System Handling Millions of Users. IEEE Symposium on Security and Privacy 2015: 321-338 - [i7]Henry Corrigan-Gibbs, Dan Boneh, David Mazières:
Riposte: An Anonymous Messaging System Handling Millions of Users. CoRR abs/1503.06115 (2015) - [i6]Amit Levy, Henry Corrigan-Gibbs, Dan Boneh:
Stickler: Defending Against Malicious CDNs in an Unmodified Browser. CoRR abs/1506.04110 (2015) - 2014
- [j1]Ewa Syta, Henry Corrigan-Gibbs, Shu-Chun Weng, David Wolinsky, Bryan Ford, Aaron Johnson:
Security Analysis of Accountable Anonymity in Dissent. ACM Trans. Inf. Syst. Secur. 17(1): 4:1-4:35 (2014) - [c8]Dan Boneh, Henry Corrigan-Gibbs:
Bivariate Polynomials Modulo Composites and Their Applications. ASIACRYPT (1) 2014: 42-62 - [c7]Henry Corrigan-Gibbs, Jay Chen:
FlashPatch: Spreading Software Updates over Flash Drives in Under-connected Regions. ACM DEV 2014: 1-10 - [i5]Dan Boneh, Henry Corrigan-Gibbs:
Bivariate Polynomials Modulo Composites and their Applications. IACR Cryptol. ePrint Arch. 2014: 719 (2014) - 2013
- [c6]Henry Corrigan-Gibbs, Wendy Mu, Dan Boneh, Bryan Ford:
Ensuring high-quality randomness in cryptographic key generation. CCS 2013: 685-696 - [c5]Henry Corrigan-Gibbs, Jay Chen:
FlashPatch: spreading software updates over flash drives in under-connected regions. ACM DEV (4) 2013: 15:1-15:2 - [c4]Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford:
Proactively Accountable Anonymous Messaging in Verdict. USENIX Security Symposium 2013: 147-162 - [c3]Henry Corrigan-Gibbs, Bryan Ford:
Conscript your friends into larger anonymity sets with JavaScript. WPES 2013: 243-248 - [i4]Henry Corrigan-Gibbs, Bryan Ford:
Conscript Your Friends into Larger Anonymity Sets with JavaScript. CoRR abs/1309.0958 (2013) - [i3]Henry Corrigan-Gibbs, Wendy Mu, Dan Boneh, Bryan Ford:
Ensuring High-Quality Randomness in Cryptographic Key Generation. CoRR abs/1309.7366 (2013) - 2012
- [c2]David Isaac Wolinsky, Henry Corrigan-Gibbs, Bryan Ford, Aaron Johnson:
Dissent in Numbers: Making Strong Anonymity Scale. OSDI 2012: 179-182 - [i2]Henry Corrigan-Gibbs, David Isaac Wolinsky, Bryan Ford:
Dining in the Sunshine: Verifiable Anonymous Communication with Verdict. CoRR abs/1209.4819 (2012) - 2010
- [c1]Henry Corrigan-Gibbs, Bryan Ford:
Dissent: accountable anonymous group messaging. CCS 2010: 340-350 - [i1]Henry Corrigan-Gibbs, Bryan Ford:
Accountable Anonymous Group Messaging. CoRR abs/1004.3057 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint