papers
-
Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Encrypted Search
Seny Kamara and Tarik Moataz
IACR ePrint
(full pdf) -
MAPLE: MArkov Process Leakage attacks on Encrypted Search
Seny Kamara, MongoDB, Abdelkarim Kati, Tarik Moataz, Jamie DeMaria, Andrew Park, Amos Treiber
Privacy Enhancing Technologies (PETS) ‘24
(full pdf) -
Injection-Secure Structured and Searchable Symmetric Encryption.
Ghous Amjad, Seny Kamara and Tarik Moataz
Asiacrypt ‘23
(full pdf) -
Synq: Public Policy Analytics Over Encrypted Data
Zachary Espiritu, Marilyn George, Seny Kamara, Lucy Qin
IEEE Security & Privacy (Oakland) ‘24
(proceedings pdf) -
Outside Looking In: Approaches to Content Moderation in End-to-End Encrypted Systems
Seny Kamara, Mallory Knodel, Emma Llansó, Greg Nojeim, Lucy Qin, Dhanaraj Thakur, Caitlin Vogus
Report for Center for Democracy and Technology ‘21
(report pdf) -
Cryptanalysis of Encrypted Search with LEAKER: A framework for LEakage AttacK Evaluation on Real-world data
Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli
IACR ePrint
(full pdf) -
Structured Encryption and Dynamic Leakage Suppression
Marilyn George, Seny Kamara, Tarik Moataz
Eurocrypt ‘21
(proceedings pdf) -
A Decentralized and Encrypted National Gun Registry
Seny Kamara, Tarik Moataz, Andrew Park, Lucy Qin
IEEE Symposium on Security and Privacy (Oakland) ‘21
(full pdf) -
Encrypted Databases: From Theory to Practice
Zheguang Zhao, Seny Kamara, Tarik Moataz, Stan Zdonik
Conference on Innovative Data Systems Research (CIDR) ‘21
(proceedings pdf) -
Adversarial Level Agreements for Two-Party Protocols
Marilyn George, Seny Kamara
IACR ePrint
(full pdf) -
Encrypted Key Value Stores
Archita Agarwal, Seny Kamara
Indocrypt ‘20
(proceedings pdf) -
Encrypted Blockchain Databases
Daniel Adkins, Archita Agarwal, Seny Kamara, Tarik Moataz
Advances in Financial Technologies ‘20
(full pdf, blog) -
Towards Untrusted Social Video Verification to Combat Deepfakes via Face Geometry Consistency
Eleanor Tursman, Marilyn George, Seny Kamara, James Tompkin
Media Forensics CVPR Workshop ‘20
(proceedings pdf, Eleanor’s Talk) -
An Optimal Relational Database Encryption Scheme
Seny Kamara, Tarik Moataz, Stan Zdonik, Zheguang Zhao
IACR ePrint
(full pdf) -
Encrypted Distributed Dictionaries
Archita Agarwal, Seny Kamara
IACR ePrint
(full pdf, blog, Archita’s talk) -
Revisiting Leakage-Abuse Attacks
Laura Blackstone, Seny Kamara, Tarik Moataz
NDSS ‘20
(full pdf) -
Computationally Volume-Hiding Structured Encryption
Seny Kamara, Tarik Moataz
Eurocrypt ‘19
(full pdf) -
Forward and Backward Private Searchable Encryption with SGX
Ghous Amjad, Seny Kamara, Tarik Moataz
Eurosec ‘19
(proceedings pdf) -
Encrypted Databases for Differential Privacy
Archita Agarwal, Maurice Herlihy, Seny Kamara, Tarik Moataz
PETS ‘19
(full pdf) -
Breach-Resistant Structured Encryption
Ghous Amjad, Seny Kamara, Tarik Moataz
PETS ‘19
(full pdf) -
SQL on Structurally-Encrypted Databases
Seny Kamara, Tarik Moataz
Asiacrypt ‘18
(full pdf) -
Structured Encryption and Leakage Suppression
Seny Kamara, Tarik Moataz, Olya Ohrimenko
CRYPTO ‘18
(proceedings pdf) -
Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity
Seny Kamara, Tarik Moataz
Eurocrypt ‘17
(proceedings pdf) -
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
G. Ateniese, A. Faonio, S. Kamara
IMA International Conference on Cryptography and Coding (IMACC ‘15) -
Inference Attacks Against Property-Preserving Encrypted Databases
Muhammad Naveed, Seny Kamara, Charles Wright
Conference on Computer and Communications Security (CCS ‘15)
Invited to Real-World Crypto, 2016
(proceedings pdf) -
GRECS: Graph Encryption for Approximate Shortest Distance Queries
Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios
Conference on Computer and Communications Security (CCS ‘15)
(full version pdf) -
Co-Location-Resistant Clouds
Y. Azar, S. Kamara, I. Menache, M. Raykova and B. Shepherd
ACM Cloud Computing Security Workshop (CCSW ‘14)
(full version pdf) -
Encrypted Search
Seny Kamara
ACM XRDS
(tech report pdf) -
Restructuring the NSA Metadata Program
Seny Kamara
Workshop on Applied Homomorphic Cryptography (WAHC ‘14)
(proceedings pdf) -
Scaling Private Set Intersection to Billion Element Sets
Seny Kamara, Payman Mohassel, Mariana Raykova and Saeed Sadeghian
Financial Cryptography and Data Security (FC’14)
(proceedings pdf) -
Tight Bounds for Online Vector Bin Packing
Y. Azar, I. Cohen, S. Kamara and B. Shepherd
ACM Symposium on the Theory of Computing (STOC ‘13) -
Garbled Circuits via Structured Encryption
Seny Kamara and Lei Wei
Workshop on Applied Homomorphic Cryptography (WAHC ‘13)
(proceedings pdf) -
Parallel Homomorphic Encryption (or MapReduce/Hadoop on Encrypted Data)
Seny Kamara and Mariana Raykova
Workshop on Applied Homomorphic Cryptography (WAHC ‘13)
(proceedings pdf; full pdf) -
Parallel and Dynamic Searchable Symmetric Encryption
Seny Kamara and Charalampos Papamanthou
Financial Cryptography and Data Security (FC ‘13)
(full pdf) -
Salus: A System for Server-Aided Secure Function Evaluation
Seny Kamara, Payman Mohassel and Ben Riva
Conference on Computer and Communications Security (CCS ‘12)
(full pdf) -
Dynamic Searchable Symmetric Encryption
Seny Kamara, Charalampos Papamanthou and Tom Roeder
Conference on Computer and Communications Security (CCS ‘12)
(full pdf) -
Secure Outsourced Computation in a Multi-Tenant Cloud
S. Kamara and M. Raykova
Workshop on Cryptography and Security in Clouds, 2011
(proceedings pdf) -
Cryptographic Cloud Storage
Seny Kamara and Kristin Lauter
Workshop on Real-Life Cryptographic Protocols and Standardization, 2010
(proceedings pdf) -
An Inspection-Resistant On-Chip Memory Architecture
M. Chase, S. Kamara, A. Putnam, T. Sherwood, D. Shumow and V. Vaikuntanathan International Symposium on Computer Architecture (ISCA ‘12)
IEEE Micro Top Picks in Computer Architecture 2013 -
Trustworthy from Silicon Up
M. Chase, S. Kamara, A. Putnam, T. Sherwood, D. Shumow and V. Vaikuntanathan
New Directions in Computer Architecture, 2011 -
Structured Encryption and Controlled Disclosure
Melissa Chase and Seny Kamara
Advances in Cryptology - ASIACRYPT ‘10
(full pdf) -
Proofs of Storage from Homomorphic Identification Protocols
G. Ateniese, S. Kamara, J. Katz
ASIACRYPT ‘09 -
Towards Practical Biometric Key Generation with Randomized Biometric Templates
L. Ballard, S. Kamara, F. Monrose, M. Reiter
ACM Conference on Computer and Communications Security (CCS ‘08) -
The Practical Subtleties of Biometric Key Generation
L. Ballard, S. Kamara, F. Monrose, M. Reiter
USENIX Security Symposium (Usenix ‘08) -
How to Encrypt with a Malicious Random Number Generator
S. Kamara, J. Katz
Workshop on Fast Software Encryption (FSE ‘08) -
Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions
Reza Curtmola, Juan Garay, Seny Kamara and Rafail Ostrovsky.
Conference on Computer and Communications Security (CCS ‘06)
Journal of Computer Security
(full pdf) -
A Mechanism for Communication-Efficient Broadcast Encryption Over Wireless Ad-Hoc Networks
R. Curtmola, S. Kamara
Workshop on Cryptography in Ad Hoc Networks (WCAN ‘06) -
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage
K. Fu, S. Kamara, T. Kohno
Network and Distributed System Security Symposium (NDSS ‘06) -
Achieving Secure Conjunctive Searches over Encrypted Data
L. Ballard, S. Kamara, F. Monrose
International Conference on Information and Communicationis Security (ICICS ‘05) -
Secret Locking: A New Approach to Biometric Key Encapsulation
S. Kamara, B. de Medeiros, S. Wetzel
International Conference on E-business and Telecommunication Networks (ICETE 2005) -
An Extensible Platform for Evaluating Security Protocols
S. Kamara, D. Davis, L. Ballard, R. Caudy, F. Monrose
Annual IEEE Simulation Symposium (IEEE ANSS ‘05) -
ActiveSync, TCP/IP and 802.11 Wireless Vulnerabilities of WinCE-based PDAs P. Meunier, S. Nystrom, S. Kamara, S. Yost, K. Alexander, D. Noland, J. Crane.
IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 02)