What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Seny Kamara
Google Scholar
40
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/cic
Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Cryptography.
Zachary Espiritu
Seny Kamara
Tarik Moataz
2025
conf/uss
PolySys: an Algebraic Leakage Attack Engine.
Zachary Espiritu
Seny Kamara
Tarik Moataz
Andrew Park
2024
journals/popets
MAPLE: MArkov Process Leakage attacks on Encrypted Search.
Seny Kamara
Abdelkarim Kati
Tarik Moataz
Jamie DeMaria
Andrew Park
Amos Treiber
2024
conf/sp
Synq: Public Policy Analytics Over Encrypted Data.
Zachary Espiritu
Marilyn George
Seny Kamara
Lucy Qin
2024
conf/asiacrypt
Concurrent Encrypted Multimaps.
Archita Agarwal
Seny Kamara
Tarik Moataz
2023
conf/asiacrypt
Injection-Secure Structured and Searchable Symmetric Encryption.
Ghous Amjad
Seny Kamara
Tarik Moataz
2022
conf/eurosp
SoK: Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data.
Seny Kamara
Abdelkarim Kati
Tarik Moataz
Thomas Schneider
Amos Treiber
Michael Yonli
2022
conf/asiaccs
Adversarial Level Agreements for Two-Party Protocols.
Marilyn George
Seny Kamara
2021
conf/sp
A Decentralized and Encrypted National Gun Registry.
Seny Kamara
Tarik Moataz
Andrew Park
Lucy Qin
2021
conf/asiaccs
Efficient Graph Encryption Scheme for Shortest Path Queries.
Esha Ghosh
Seny Kamara
Roberto Tamassia
2021
conf/eurocrypt
Structured Encryption and Dynamic Leakage Suppression.
Marilyn George
Seny Kamara
Tarik Moataz
2020
conf/ndss
Revisiting Leakage Abuse Attacks.
Laura Blackstone
Seny Kamara
Tarik Moataz
2019
journals/popets
Breach-Resistant Structured Encryption.
Ghous Amjad
Seny Kamara
Tarik Moataz
2019
journals/popets
Encrypted Databases for Differential Privacy.
Archita Agarwal
Maurice Herlihy
Seny Kamara
Tarik Moataz
2019
conf/eurocrypt
Computationally Volume-Hiding Structured Encryption.
Seny Kamara
Tarik Moataz
2018
conf/crypto
Structured Encryption and Leakage Suppression.
Seny Kamara
Tarik Moataz
Olga Ohrimenko
2018
conf/acns
DogFish: Decentralized Optimistic Game-theoretic FIle SHaring.
Seny Kamara
Alptekin Küpçü
2018
conf/asiacrypt
SQL on Structurally-Encrypted Databases.
Seny Kamara
Tarik Moataz
2017
conf/eurocrypt
Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity.
Seny Kamara
Tarik Moataz
2015
conf/ccs
GRECS: Graph Encryption for Approximate Shortest Distance Queries.
Xianrui Meng
Seny Kamara
Kobbi Nissim
George Kollios
2015
conf/ccs
Inference Attacks on Property-Preserving Encrypted Databases.
Muhammad Naveed
Seny Kamara
Charles V. Wright
2014
conf/ccs
Co-Location-Resistant Clouds.
Yossi Azar
Seny Kamara
Ishai Menache
Mariana Raykova
F. Bruce Shepherd
2014
conf/fc
Scaling Private Set Intersection to Billion-Element Sets.
Seny Kamara
Payman Mohassel
Mariana Raykova
Seyed Saeed Sadeghian
2014
conf/fc
Restructuring the NSA Metadata Program.
Seny Kamara
2013
conf/fc
Garbled Circuits via Structured Encryption.
Seny Kamara
Lei Wei
2013
conf/fc
Parallel and Dynamic Searchable Symmetric Encryption.
Seny Kamara
Charalampos Papamanthou
2013
conf/fc
Parallel Homomorphic Encryption.
Seny Kamara
Mariana Raykova
2012
conf/ccs
Salus: a system for server-aided secure function evaluation.
Seny Kamara
Payman Mohassel
Ben Riva
2012
conf/ccs
4th cloud computing security workshop (CCSW 2012).
Srdjan Capkun
Seny Kamara
2012
conf/ccs
Dynamic searchable symmetric encryption.
Seny Kamara
Charalampos Papamanthou
Tom Roeder
2010
conf/fc
Cryptographic Cloud Storage.
Seny Kamara
Kristin E. Lauter
2010
conf/asiacrypt
Structured Encryption and Controlled Disclosure.
Melissa Chase
Seny Kamara
2009
conf/asiacrypt
Proofs of Storage from Homomorphic Identification Protocols.
Giuseppe Ateniese
Seny Kamara
Jonathan Katz
2008
conf/fse
How to Encrypt with a Malicious Random Number Generator.
Seny Kamara
Jonathan Katz
2008
conf/ccs
Towards practical biometric key generation with randomized biometric templates.
Lucas Ballard
Seny Kamara
Fabian Monrose
Michael K. Reiter
2008
conf/uss
The Practical Subtleties of Biometric Key Generation.
Lucas Ballard
Seny Kamara
Michael K. Reiter
2006
conf/ccs
Searchable symmetric encryption: improved definitions and efficient constructions.
Reza Curtmola
Juan A. Garay
Seny Kamara
Rafail Ostrovsky
2006
conf/ndss
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage.
Kevin Fu
Seny Kamara
Yoshi Kohno
2005
conf/icics
Achieving Efficient Conjunctive Keyword Searches over Encrypted Data.
Lucas Ballard
Seny Kamara
Fabian Monrose
2003
journals/compsec
Analysis of vulnerabilities in Internet firewalls.
Seny Kamara
Sonia Fahmy
E. Eugene Schultz
Florian Kerschbaum
Michael Frantzen
Coauthors
Abdelkarim Kati
(2)
Alptekin Küpçü
(1)
Amos Treiber
(2)
Andrew Park
(3)
Archita Agarwal
(2)
Ben Riva
(1)
Charalampos Papamanthou
(2)
Charles V. Wright
(1)
E. Eugene Schultz
(1)
Esha Ghosh
(1)
F. Bruce Shepherd
(1)
Fabian Monrose
(2)
Florian Kerschbaum
(1)
George Kollios
(1)
Ghous Amjad
(2)
Giuseppe Ateniese
(1)
Ishai Menache
(1)
Jamie DeMaria
(1)
Jonathan Katz
(2)
Juan A. Garay
(1)
Kevin Fu
(1)
Kobbi Nissim
(1)
Kristin E. Lauter
(1)
Laura Blackstone
(1)
Lei Wei
(1)
Lucas Ballard
(3)
Lucy Qin
(2)
Mariana Raykova
(3)
Marilyn George
(3)
Maurice Herlihy
(1)
Melissa Chase
(1)
Michael Frantzen
(1)
Michael K. Reiter
(2)
Michael Yonli
(1)
Muhammad Naveed
(1)
Olga Ohrimenko
(1)
Payman Mohassel
(2)
Rafail Ostrovsky
(1)
Reza Curtmola
(1)
Roberto Tamassia
(1)
Seny Kamara
(40)
Seyed Saeed Sadeghian
(1)
Sonia Fahmy
(1)
Srdjan Capkun
(1)
Tarik Moataz
(15)
Thomas Schneider
(1)
Tom Roeder
(1)
Xianrui Meng
(1)
Yoshi Kohno
(1)
Yossi Azar
(1)
Zachary Espiritu
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to