Prati
Kevin Yeo
Kevin Yeo
Potvrđena adresa e-pošte na google.com - Početna stranica
Naslov
Citirano
Citirano
Godina
Protecting accounts from credential stuffing with password breach alerting
K Thomas, J Pullman, K Yeo, A Raghunathan, PG Kelley, L Invernizzi, ...
28th USENIX Security Symposium (USENIX Security 19), 1556-1571, 2019
1052019
Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing
S Patel, G Persiano, K Yeo, M Yung
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019
842019
PanORAMa: Oblivious RAM with logarithmic overhead
S Patel, G Persiano, M Raykova, K Yeo
2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS …, 2018
822018
{Communication–Computation} Trade-offs in {PIR}
A Ali, T Lepoint, S Patel, M Raykova, P Schoppmann, K Seth, K Yeo
30th USENIX Security Symposium (USENIX Security 21), 1811-1828, 2021
572021
Private stateful information retrieval
S Patel, G Persiano, K Yeo
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
492018
Lower bounds for differentially private RAMs
G Persiano, K Yeo
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
312019
Symmetric searchable encryption with sharing and unsharing
S Patel, G Persiano, K Yeo
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
252018
Lower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe model
S Patel, G Persiano, K Yeo
Annual International Cryptology Conference, 433-463, 2020
24*2020
Lower bounds for oblivious near-neighbor search
KG Larsen, T Malkin, O Weinstein, K Yeo
Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete …, 2020
212020
Lower bounds for multi-server oblivious RAMs
KG Larsen, M Simkin, K Yeo
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020
202020
CacheShuffle: A family of oblivious shuffles
S Patel, G Persiano, K Yeo
45th International Colloquium on Automata, Languages, and Programming (ICALP …, 2018
20*2018
What Storage Access Privacy is Achievable with Small Overhead?
S Patel, G Persiano, K Yeo
Proceedings of the 38th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of …, 2019
182019
Dynamic volume-hiding encrypted multi-maps with applications to searchable encryption
G Amjad, S Patel, G Persiano, K Yeo, M Yung
Cryptology ePrint Archive, 2021
162021
Limits of preprocessing for single-server PIR
G Persiano, K Yeo
Proceedings of the 2022 Annual ACM-SIAM Symposium on Discrete Algorithms …, 2022
112022
Lower bound framework for differentially private and oblivious data structures
G Persiano, K Yeo
Annual International Conference on the Theory and Applications of …, 2023
62023
Sok: Sct auditing in certificate transparency
S Meiklejohn, J DeBlasio, D O'Brien, C Thompson, K Yeo, E Stark
arXiv preprint arXiv:2203.01661, 2022
62022
Lower bounds for (batch) pir with private preprocessing
K Yeo
Annual International Conference on the Theory and Applications of …, 2023
52023
Efficient boolean search over encrypted data with reduced leakage
S Patel, G Persiano, JY Seo, K Yeo
International Conference on the Theory and Application of Cryptology and …, 2021
52021
Forward secret encrypted RAM: lower bounds and applications
A Bienstock, Y Dodis, K Yeo
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021
42021
Cuckoo hashing in cryptography: Optimal parameters, robustness and applications
K Yeo
arXiv preprint arXiv:2306.11220, 2023
32023
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20