publications
Authors are listed in alphabetical order, unless stated otherwise.
2025
- CCSDifferentially Private Access in Encrypted Search: Achieving Privacy at a Small Cost?In 2025 ACM SIGSAC Conference on Computer and Communications Security (CCS ’25), Oct 2025
- CCSMay the Force not Be with you: Brute-Force Resistant Biometric Authentication and Key ReconstructionIn 2025 ACM SIGSAC Conference on Computer and Communications Security (CCS ’25), Oct 2025
2024
- ePrint
- SCNEncrypted Multi-map that Hides Query, Access, and Volume PatternsIn International Conference on Security and Cryptography for Networks, Jul 2024
2023
2021
- PoPETsPrivacy-preserving Approximate k-Nearest-Neighbors Search that Hides Access, Query and Volume PatternsIn Proceedings on Privacy Enhancing Technologies, Jul 2021
2019
- ACNSMasking Fuzzy-Searchable Public DatabasesIn International Conference on Applied Cryptography and Network Security, Jun 2019