Practical dynamic searchable encryption with small leakage

Charalampos Babis Papamanthou , E Stefanov , E Shi
Proc. Netw. Distrib. Syst. Secur. Symp 23 -26

2
2014
MOMMIE knows best: systematic optimizations for verifiable distributed algorithms

Charalampos Papamanthou , Petros Maniatis , Michael Dietz
hot topics in operating systems 30 -30

2
2011
Publicly Verifiable Delegation of Computation.

Roberto Tamassia , Charalampos Papamanthou , Elaine Shi
IACR Cryptology ePrint Archive 2011 587

12
2011
TWORAM: Round-Optimal Oblivious RAM with Applications to Searchable Encryption.

Charalampos Papamanthou , Payman Mohassel , Sanjam Garg
IACR Cryptology ePrint Archive 2015 1010

14
2015
How to Use SNARKs in Universally Composable Protocols.

Ahmed E. Kosba , Charalampos Papamanthou , Rafael Pass , T.-H. Hubert Chan
IACR Cryptology ePrint Archive 2015 1093

13
2015
Cryptography for Efficiency: Authenticated Data Structures Based on Lattices and Parallel Online Memory Checking.

Roberto Tamassia , Charalampos Papamanthou
IACR Cryptology ePrint Archive 2011 102

3
2011
Update-Optimal Authenticated Structures Based on Lattices.

Roberto Tamassia , Charalampos Papamanthou
IACR Cryptology ePrint Archive 2010 128

3
2010
All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption

Charalampos Papamanthou , Jonathan Katz , Yupeng Zhang
usenix security symposium 707 -720

451
2016
A Zero-Knowledge Version of vSQL.

Charalampos Papamanthou , Daniel Genkin , Dimitrios Papadopoulos , Jonathan Katz
IACR Cryptology ePrint Archive 2017 1146

11
2017
Edrax: A Cryptocurrency with Stateless Transaction Validation.

Alexander Chepurnoy , Charalampos Papamanthou , Shravan Srinivasan , Yupeng Zhang
IACR Cryptology ePrint Archive 2018 968

9
2018
Practical dynamic proofs of retrievability with multiple buffers

Charalampos Papamanthou , Elaine Shi , Emil Stefanov

1
2018
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts.

Ahmed E. Kosba , Charalampos Papamanthou , Andrew Miller , Elaine Shi
IACR Cryptology ePrint Archive 2015 675

2,571
2015
Oblivious Network RAM.

Uzi Vishkin , Dana Dachman-Soled , Charalampos Papamanthou , Elaine Shi
IACR Cryptology ePrint Archive 2015 73

4
2015
Dynamic Searchable Encryption with Small Client Storage.

Charalampos Papamanthou , Dimitrios Papadopoulos , Ioannis Demertzis , Javad Ghareh Chamani
IACR Cryptology ePrint Archive 2019 1227

59
2019
{MIRAGE}: Succinct Arguments for Randomized Algorithms with Applications to Universal zk-SNARKs

Ahmed E. Kosba , Charalampos Papamanthou , Dawn Song , Dimitrios Papadopoulos
usenix security symposium 2129 -2146

2020
TRUESET: Nearly Practical Verifiable Set Computations.

Nikos Triandopoulos , Ahmed E. Kosba , Charalampos Papamanthou , Dimitrios Papadopoulos
IACR Cryptology ePrint Archive 2014 160

5
2014
Practical Dynamic Searchable Encryption with Small Leakage.

Charalampos Papamanthou , Emil Stefanov , Elaine Shi
IACR Cryptology ePrint Archive 2013 832

624
2013
Parallel and Dynamic Searchable Symmetric Encryption.

Charalampos Papamanthou , Seny Kamara
IACR Cryptology ePrint Archive 2013 335

597
2013
{SEAL}: Attack Mitigation for Encrypted Databases via Adjustable Leakage

Charalampos Papamanthou , Dimitrios Papadopoulos , Saurabh Shintre , Ioannis Demertzis
usenix security symposium 2433 -2450

6
2020
Nearly Quadratic Broadcast Without Trusted Setup Under Dishonest Majority.

Charalampos Papamanthou , Julian Loss , Georgios Tsimos
IACR Cryptology ePrint Archive 2020 894

2
2020