Henry Corrigan-Gibbs
Henry Corrigan-Gibbs
MIT CSAIL
Verified email at csail.mit.edu - Homepage
Title
Cited by
Cited by
Year
Dissent: accountable anonymous group messaging
H Corrigan-Gibbs, B Ford
Proceedings of the 17th ACM conference on Computer and communications …, 2010
2082010
Dissent in Numbers: Making Strong Anonymity Scale.
DI Wolinsky, H Corrigan-Gibbs, B Ford, A Johnson
OSDI, 179-182, 2012
2002012
Riposte: An Anonymous Messaging System Handling Millions of Users
H Corrigan-Gibbs, D Boneh, D Mazières
IEEE Security and Privacy, 2015
1552015
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics
H Corrigan-Gibbs, D Boneh
14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), 0
118*
Proactively accountable anonymous messaging in Verdict
H Corrigan-Gibbs, DI Wolinsky, B Ford
USENIX Security, 2013
732013
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks
D Boneh, H Corrigan-Gibbs, S Schechter
Asiacrypt, 2016
64*2016
Atom: Horizontally Scaling Strong Anonymity
A Kwon, H Corrigan-Gibbs, S Devadas, B Ford
SOSP, 2017
54*2017
Deterring Cheating in Online Environments
H Corrigan-Gibbs, N Gupta, C Northcutt, E Cutrell, W Thies
ACM Transactions on Computer-Human Interaction (TOCHI) 22 (6), 28, 2015
532015
Scalable anonymous group communication in the anytrust model
DI Wolinsky, H Corrigan-Gibbs, B Ford, A Johnson
European Workshop on System Security (EuroSec) 4, 2012
362012
Trust but Verify: Auditing the Secure Internet of Things
J Wilson, RS Wahby, H Corrigan-Gibbs, D Boneh, P Levis, K Winstein
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
342017
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs
D Boneh, E Boyle, H Corrigan-Gibbs, N Gilboa, Y Ishai
CRYPTO, 2019
28*2019
The discrete-logarithm problem with preprocessing
H Corrigan-Gibbs, D Kogan
EUROCRYPT, 415-447, 2018
232018
Security analysis of accountable anonymity in Dissent
E Syta, H Corrigan-Gibbs, SC Weng, D Wolinsky, B Ford, A Johnson
ACM Transactions on Information and System Security (TISSEC) 17 (1), 1-35, 2014
23*2014
Ensuring high-quality randomness in cryptographic key generation
H Corrigan-Gibbs, W Mu, D Boneh, B Ford
CCS, 685-696, 2013
222013
Stickler: Defending against Malicious Content Distribution Networks in an Unmodified Browser
A Levy, H Corrigan-Gibbs, D Boneh
IEEE Security & Privacy 14 (2), 22-28, 2016
20*2016
FlashPatch: spreading software updates over flash drives in under-connected regions
H Corrigan-Gibbs, J Chen
Proceedings of the Fifth ACM Symposium on Computing for Development, 1-10, 2014
162014
Bivariate Polynomials Modulo Composites and their Applications
D Boneh, H Corrigan-Gibbs
Advances in Cryptology–ASIACRYPT 2014, 42-62, 2014
162014
Recommendations for randomness in the operating system, or how to keep evil children out of your pool and other random facts
H Corrigan-Gibbs, S Jana
15th Workshop on Hot Topics in Operating Systems (HotOS {XV}), 2015
152015
Private information retrieval with sublinear online time
H Corrigan-Gibbs, D Kogan
Annual International Conference on the Theory and Applications of …, 2020
142020
The function-inversion problem: Barriers and opportunities
H Corrigan-Gibbs, D Kogan
Theory of Cryptography Conference, 393-421, 2019
122019
The system can't perform the operation now. Try again later.
Articles 1–20