Protecting accounts from credential stuffing with password breach alerting K Thomas, J Pullman, K Yeo, A Raghunathan, PG Kelley, L Invernizzi, ... 28th USENIX Security Symposium (USENIX Security 19), 1556-1571, 2019 | 105 | 2019 |
Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing S Patel, G Persiano, K Yeo, M Yung Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications …, 2019 | 84 | 2019 |
PanORAMa: Oblivious RAM with logarithmic overhead S Patel, G Persiano, M Raykova, K Yeo 2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS …, 2018 | 82 | 2018 |
{Communication–Computation} Trade-offs in {PIR} A Ali, T Lepoint, S Patel, M Raykova, P Schoppmann, K Seth, K Yeo 30th USENIX Security Symposium (USENIX Security 21), 1811-1828, 2021 | 57 | 2021 |
Private stateful information retrieval S Patel, G Persiano, K Yeo Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 49 | 2018 |
Lower bounds for differentially private RAMs G Persiano, K Yeo Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 31 | 2019 |
Symmetric searchable encryption with sharing and unsharing S Patel, G Persiano, K Yeo Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 25 | 2018 |
Lower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe model S Patel, G Persiano, K Yeo Annual International Cryptology Conference, 433-463, 2020 | 24* | 2020 |
Lower bounds for oblivious near-neighbor search KG Larsen, T Malkin, O Weinstein, K Yeo Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete …, 2020 | 21 | 2020 |
Lower bounds for multi-server oblivious RAMs KG Larsen, M Simkin, K Yeo Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020 | 20 | 2020 |
CacheShuffle: A family of oblivious shuffles S Patel, G Persiano, K Yeo 45th International Colloquium on Automata, Languages, and Programming (ICALP …, 2018 | 20* | 2018 |
What Storage Access Privacy is Achievable with Small Overhead? S Patel, G Persiano, K Yeo Proceedings of the 38th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of …, 2019 | 18 | 2019 |
Dynamic volume-hiding encrypted multi-maps with applications to searchable encryption G Amjad, S Patel, G Persiano, K Yeo, M Yung Cryptology ePrint Archive, 2021 | 16 | 2021 |
Limits of preprocessing for single-server PIR G Persiano, K Yeo Proceedings of the 2022 Annual ACM-SIAM Symposium on Discrete Algorithms …, 2022 | 11 | 2022 |
Lower bound framework for differentially private and oblivious data structures G Persiano, K Yeo Annual International Conference on the Theory and Applications of …, 2023 | 6 | 2023 |
Sok: Sct auditing in certificate transparency S Meiklejohn, J DeBlasio, D O'Brien, C Thompson, K Yeo, E Stark arXiv preprint arXiv:2203.01661, 2022 | 6 | 2022 |
Lower bounds for (batch) pir with private preprocessing K Yeo Annual International Conference on the Theory and Applications of …, 2023 | 5 | 2023 |
Efficient boolean search over encrypted data with reduced leakage S Patel, G Persiano, JY Seo, K Yeo International Conference on the Theory and Application of Cryptology and …, 2021 | 5 | 2021 |
Forward secret encrypted RAM: lower bounds and applications A Bienstock, Y Dodis, K Yeo Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021 | 4 | 2021 |
Cuckoo hashing in cryptography: Optimal parameters, robustness and applications K Yeo arXiv preprint arXiv:2306.11220, 2023 | 3 | 2023 |