What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Srinivas Devadas
Google Scholar
50
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
PAC-Private Algorithms.
Mayuri Sridhar
Hanshen Xiao
Srinivas Devadas
2024
conf/ccs
Formal Privacy Proof of Data Encoding: The Possibility and Impossibility of Learnable Encryption.
Hanshen Xiao
G. Edward Suh
Srinivas Devadas
2024
conf/asiacrypt
QuietOT: Lightweight Oblivious Transfer with a Public-Key Setup.
Geoffroy Couteau
Lalita Devadas
Srinivas Devadas
Alexander Koch
Sacha Servan-Schreiber
2023
conf/ccs
Geometry of Sensitivity: Twice Sampling and Hybrid Clipping in Differential Privacy with Optimal Gaussian Noise and Application to Deep Learning.
Hanshen Xiao
Jun Wan
Srinivas Devadas
2023
conf/uss
Remote Direct Memory Introspection.
Hongyi Liu
Jiarong Xing
Yibo Huang
Danyang Zhuo
Srinivas Devadas
Ang Chen
2023
conf/crypto
PAC Privacy: Automatic Privacy Measurement and Control of Data Processing.
Hanshen Xiao
Srinivas Devadas
2023
conf/sp
A Theory to Instruct Differentially-Private Learning via Clipping Bias Reduction.
Hanshen Xiao
Zihang Xiang
Di Wang
Srinivas Devadas
2023
conf/ndss
Trellis: Robust and Scalable Metadata-private Anonymous Broadcast.
Simon Langowski
Sacha Servan-Schreiber
Srinivas Devadas
2022
conf/ccs
Designing Hardware for Cryptography and Cryptography for Hardware.
Srinivas Devadas
Simon Langowski
Nikola Samardzic
Sacha Servan-Schreiber
Daniel Sánchez
2022
conf/sp
Private Approximate Nearest Neighbor Search with Sublinear Communication.
Sacha Servan-Schreiber
Simon Langowski
Srinivas Devadas
2022
conf/sp
ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing.
Kyle Hogan
Sacha Servan-Schreiber
Zachary Newman
Ben Weintraub
Cristina Nita-Rotaru
Srinivas Devadas
2020
conf/sp
Towards Scalable Threshold Cryptosystems.
Alin Tomescu
Robert Chen
Yiming Zheng
Ittai Abraham
Benny Pinkas
Guy Golan-Gueta
Srinivas Devadas
2020
conf/tcc
Expected Constant Round Byzantine Broadcast Under Dishonest Majority.
Jun Wan
Hanshen Xiao
Elaine Shi
Srinivas Devadas
2020
conf/tcc
Round-Efficient Byzantine Broadcast Under Strongly Adaptive and Majority Corruptions.
Jun Wan
Hanshen Xiao
Srinivas Devadas
Elaine Shi
2019
journals/popets
Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning.
Sanjit Bhat
David Lu
Albert Kwon
Srinivas Devadas
2019
conf/ccs
Transparency Logs via Append-Only Authenticated Dictionaries.
Alin Tomescu
Vivek Bhupatiraju
Dimitrios Papadopoulos
Charalampos Papamanthou
Nikos Triandopoulos
Srinivas Devadas
2019
conf/fc
Synchronous Byzantine Agreement with Expected O(1) Rounds, Expected O(n<sup>2</sup>) Communication, and Optimal Resilience.
Ittai Abraham
Srinivas Devadas
Danny Dolev
Kartik Nayak
Ling Ren
2017
journals/compsec
PriviPK: Certificate-less and secure email communication.
Mashael AlSabah
Alin Tomescu
Ilia A. Lebedev
Dimitrios N. Serpanos
Srinivas Devadas
2017
conf/ccs
Secure Hardware and Cryptography: Contrasts, Synergies and Challenges.
Srinivas Devadas
2017
conf/ccs
A Formal Foundation for Secure Remote Execution of Enclaves.
Pramod Subramanyan
Rohit Sinha
Ilia A. Lebedev
Srinivas Devadas
Sanjit A. Seshia
2017
conf/sp
Catena: Efficient Non-equivocation via Bitcoin.
Alin Tomescu
Srinivas Devadas
2017
conf/tcc
Bandwidth Hard Functions for ASIC Resistance.
Ling Ren
Srinivas Devadas
2017
conf/tcc
On Iterative Collision Search for LPN and Subset Sum.
Srinivas Devadas
Ling Ren
Hanshen Xiao
2016
journals/popets
Riffle: An Efficient Communication System With Strong Anonymity.
Albert Kwon
David Lazar
Srinivas Devadas
Bryan Ford
2016
conf/uss
Sanctum: Minimal Hardware Extensions for Strong Software Isolation.
Victor Costan
Ilia A. Lebedev
Srinivas Devadas
2016
conf/tcc
Onion ORAM: A Constant Bandwidth Blowup Oblivious RAM.
Srinivas Devadas
Marten van Dijk
Christopher W. Fletcher
Ling Ren
Elaine Shi
Daniel Wichs
2016
conf/tcc
Proof of Space from Stacked Expanders.
Ling Ren
Srinivas Devadas
2015
conf/uss
Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services.
Albert Kwon
Mashael AlSabah
David Lazar
Marc Dacier
Srinivas Devadas
2015
conf/uss
Constants Count: Practical Improvements to Oblivious RAM.
Ling Ren
Christopher W. Fletcher
Albert Kwon
Emil Stefanov
Elaine Shi
Marten van Dijk
Srinivas Devadas
2015
conf/host
Maximum-likelihood decoding of device-specific multi-bit symbols for reliable key generation.
Meng-Day (Mandel) Yu
Matthias Hiller
Srinivas Devadas
2014
conf/host
A noise bifurcation architecture for linear additive physical functions.
Meng-Day (Mandel) Yu
David M'Raïhi
Ingrid Verbauwhede
Srinivas Devadas
2013
journals/tifs
PUF Modeling Attacks on Simulated and Silicon Data.
Ulrich Rührmair
Jan Sölter
Frank Sehnke
Xiaolin Xu
Ahmed Mahmoud
Vera Stoyanova
Gideon Dror
Jürgen Schmidhuber
Wayne P. Burleson
Srinivas Devadas
2013
conf/ccs
Authenticated storage using small trusted hardware.
Hsin-Jung Yang
Victor Costan
Nickolai Zeldovich
Srinivas Devadas
2013
conf/ccs
Path ORAM: an extremely simple oblivious RAM protocol.
Emil Stefanov
Marten van Dijk
Elaine Shi
Christopher W. Fletcher
Ling Ren
Xiangyao Yu
Srinivas Devadas
2013
conf/ccs
Generalized external interaction with tamper-resistant hardware with bounded information leakage.
Xiangyao Yu
Christopher W. Fletcher
Ling Ren
Marten van Dijk
Srinivas Devadas
2012
conf/ccs
Towards an interpreter for efficient encrypted computation.
Christopher W. Fletcher
Marten van Dijk
Srinivas Devadas
2012
conf/sp
Slender PUF Protocol: A Lightweight, Robust, and Secure Authentication by Substring Matching.
Mehrdad Majzoobi
Masoud Rostami
Farinaz Koushanfar
Dan S. Wallach
Srinivas Devadas
2012
conf/host
Performance metrics and empirical results of a PUF cryptographic key generation ASIC.
Meng-Day (Mandel) Yu
Richard Sowell
Alok Singh
David M'Raïhi
Srinivas Devadas
2011
conf/ches
FPGA-Based True Random Number Generation Using Circuit Metastability with Adaptive Feedback Control.
Mehrdad Majzoobi
Farinaz Koushanfar
Srinivas Devadas
2011
conf/ches
Lightweight and Secure PUF Key Storage Using Limits of Machine Learning.
Meng-Day (Mandel) Yu
David M'Raïhi
Richard Sowell
Srinivas Devadas
2011
conf/host
Security challenges and opportunities in adaptive and reconfigurable hardware.
Victor Costan
Srinivas Devadas
2011
conf/host
Reliable and efficient PUF-based key generation using pattern matching.
Zdenek Sid Paral
Srinivas Devadas
2010
conf/ccs
Modeling attacks on physical unclonable functions.
Ulrich Rührmair
Frank Sehnke
Jan Sölter
Gideon Dror
Srinivas Devadas
Jürgen Schmidhuber
2007
conf/ccs
Offline untrusted storage with immediate detection of forking and replay attacks.
Marten van Dijk
Jonathan Rhodes
Luis F. G. Sarmenta
Srinivas Devadas
2006
conf/ccs
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS.
Luis F. G. Sarmenta
Marten van Dijk
Charles W. O'Donnell
Jonathan Rhodes
Srinivas Devadas
2005
journals/istr
AEGIS: A single-chip secure processor.
G. Edward Suh
Charles W. O'Donnell
Srinivas Devadas
2005
conf/sp
Towards Constant Bandwidth Overhead Integrity Checking of Untrusted Data.
Dwaine E. Clarke
G. Edward Suh
Blaise Gassend
Ajay Sudan
Marten van Dijk
Srinivas Devadas
2003
conf/asiacrypt
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking.
Dwaine E. Clarke
Srinivas Devadas
Marten van Dijk
Blaise Gassend
G. Edward Suh
2002
conf/ccs
Silicon physical random functions.
Blaise Gassend
Dwaine E. Clarke
Marten van Dijk
Srinivas Devadas
2002
conf/acsac
Controlled Physical Random Functions.
Blaise Gassend
Dwaine E. Clarke
Marten van Dijk
Srinivas Devadas
Coauthors
Ahmed Mahmoud
(1)
Ajay Sudan
(1)
Albert Kwon
(4)
Alexander Koch
(1)
Alin Tomescu
(4)
Alok Singh
(1)
Ang Chen
(1)
Ben Weintraub
(1)
Benny Pinkas
(1)
Blaise Gassend
(4)
Bryan Ford
(1)
Charalampos Papamanthou
(1)
Charles W. O'Donnell
(2)
Christopher W. Fletcher
(5)
Cristina Nita-Rotaru
(1)
Dan S. Wallach
(1)
Daniel Sánchez
(1)
Daniel Wichs
(1)
Danny Dolev
(1)
Danyang Zhuo
(1)
David Lazar
(2)
David Lu
(1)
David M'Raïhi
(3)
Di Wang
(1)
Dimitrios N. Serpanos
(1)
Dimitrios Papadopoulos
(1)
Dwaine E. Clarke
(4)
Elaine Shi
(5)
Emil Stefanov
(2)
Farinaz Koushanfar
(2)
Frank Sehnke
(2)
G. Edward Suh
(4)
Geoffroy Couteau
(1)
Gideon Dror
(2)
Guy Golan-Gueta
(1)
Hanshen Xiao
(8)
Hongyi Liu
(1)
Hsin-Jung Yang
(1)
Ilia A. Lebedev
(3)
Ingrid Verbauwhede
(1)
Ittai Abraham
(2)
Jan Sölter
(2)
Jiarong Xing
(1)
Jonathan Rhodes
(2)
Jun Wan
(3)
Jürgen Schmidhuber
(2)
Kartik Nayak
(1)
Kyle Hogan
(1)
Lalita Devadas
(1)
Ling Ren
(8)
Luis F. G. Sarmenta
(2)
Marc Dacier
(1)
Marten van Dijk
(11)
Mashael AlSabah
(2)
Masoud Rostami
(1)
Matthias Hiller
(1)
Mayuri Sridhar
(1)
Mehrdad Majzoobi
(2)
Meng-Day (Mandel) Yu
(4)
Nickolai Zeldovich
(1)
Nikola Samardzic
(1)
Nikos Triandopoulos
(1)
Pramod Subramanyan
(1)
Richard Sowell
(2)
Robert Chen
(1)
Rohit Sinha
(1)
Sacha Servan-Schreiber
(5)
Sanjit A. Seshia
(1)
Sanjit Bhat
(1)
Simon Langowski
(3)
Srinivas Devadas
(50)
Ulrich Rührmair
(2)
Vera Stoyanova
(1)
Victor Costan
(3)
Vivek Bhupatiraju
(1)
Wayne P. Burleson
(1)
Xiangyao Yu
(2)
Xiaolin Xu
(1)
Yibo Huang
(1)
Yiming Zheng
(1)
Zachary Newman
(1)
Zdenek Sid Paral
(1)
Zihang Xiang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to