Henry Corrigan-Gibbs
Henry Corrigan-Gibbs
MIT CSAIL
Verified email at csail.mit.edu - Homepage
Title
Cited by
Cited by
Year
Dissent: accountable anonymous group messaging
H Corrigan-Gibbs, B Ford
Proceedings of the 17th ACM conference on Computer and communications …, 2010
2302010
Dissent in Numbers: Making Strong Anonymity Scale.
DI Wolinsky, H Corrigan-Gibbs, B Ford, A Johnson
OSDI, 179-182, 2012
2222012
Riposte: An Anonymous Messaging System Handling Millions of Users
H Corrigan-Gibbs, D Boneh, D Mazières
IEEE Security and Privacy, 2015
1812015
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics
H Corrigan-Gibbs, D Boneh
14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), 2017
1452017
Proactively accountable anonymous messaging in Verdict
H Corrigan-Gibbs, DI Wolinsky, B Ford
USENIX Security, 2013
822013
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks
D Boneh, H Corrigan-Gibbs, S Schechter
Asiacrypt, 2016
73*2016
Deterring Cheating in Online Environments
H Corrigan-Gibbs, N Gupta, C Northcutt, E Cutrell, W Thies
ACM Transactions on Computer-Human Interaction (TOCHI) 22 (6), 28, 2015
652015
Atom: Horizontally Scaling Strong Anonymity
A Kwon, H Corrigan-Gibbs, S Devadas, B Ford
SOSP, 2017
642017
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs
D Boneh, E Boyle, H Corrigan-Gibbs, N Gilboa, Y Ishai
CRYPTO, 2019
402019
Trust but Verify: Auditing the Secure Internet of Things
J Wilson, RS Wahby, H Corrigan-Gibbs, D Boneh, P Levis, K Winstein
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
402017
Scalable anonymous group communication in the anytrust model
DI Wolinsky, H Corrigan-Gibbs, B Ford, A Johnson
European Workshop on System Security (EuroSec) 4, 2012
402012
The discrete-logarithm problem with preprocessing
H Corrigan-Gibbs, D Kogan
EUROCRYPT, 415-447, 2018
272018
Security analysis of accountable anonymity in Dissent
E Syta, H Corrigan-Gibbs, SC Weng, D Wolinsky, B Ford, A Johnson
ACM Transactions on Information and System Security (TISSEC) 17 (1), 1-35, 2014
24*2014
Stickler: Defending against Malicious Content Distribution Networks in an Unmodified Browser
A Levy, H Corrigan-Gibbs, D Boneh
IEEE Security & Privacy 14 (2), 22-28, 2016
23*2016
Ensuring high-quality randomness in cryptographic key generation
H Corrigan-Gibbs, W Mu, D Boneh, B Ford
CCS, 685-696, 2013
222013
Private information retrieval with sublinear online time
H Corrigan-Gibbs, D Kogan
EUROCRYPT, 44-75, 2020
192020
Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy
S Eskandarian, H Corrigan-Gibbs, M Zaharia, D Boneh
USENIX Security, 2021
172021
FlashPatch: spreading software updates over flash drives in under-connected regions
H Corrigan-Gibbs, J Chen
Proceedings of the Fifth ACM Symposium on Computing for Development, 1-10, 2014
172014
Bivariate Polynomials Modulo Composites and their Applications
D Boneh, H Corrigan-Gibbs
Advances in Cryptology–ASIACRYPT 2014, 42-62, 2014
162014
Recommendations for randomness in the operating system, or how to keep evil children out of your pool and other random facts
H Corrigan-Gibbs, S Jana
15th Workshop on Hot Topics in Operating Systems (HotOS {XV}), 2015
152015
The system can't perform the operation now. Try again later.
Articles 1–20