Publications

(2018). Correcting Subverted Random Oracles. 38th Annual International Cryptology Conference (CRYPTO).
(2017). Quantum-Secure Symmetric-Key Cryptography Based on Hidden Shifts. 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT).
(2017). Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. 37th Annual International Cryptology Conference (CRYPTO).
(2017). High Availability for VM Placement and a Stochastic Model for Multiple Knapsack. 26th International Conference on Computer Communication and Networks (ICCCN).
(2017). Generic Semantic Security against a Kleptographic Adversary. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS).
(2016). Multi-view Bi-clustering to Identify Smartphone Sensing Features Indicative of Depression. IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE).
(2016). Markovian Hitters and the Complexity of Blind Rendezvous. Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms (SODA).
(2016). Efficient Encrypted Keyword Search for Multi-user Data Sharing. Proceedings of the 21st European Symposium on Research in Computer Security (ESORICS).
(2016). Codes, lower bounds, and phase transitions in the symmetric rendezvous problem. Random Struct. Algorithms.
(2016). Cliptography: Clipping the Power of Kleptographic Attacks. 22nd International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT).