Paul Grubbs
Paul Grubbs
Cornell University, Cornell Tech
Verified email at cornell.edu - Homepage
TitleCited byYear
Leakage-abuse attacks against searchable encryption
D Cash, P Grubbs, J Perry, T Ristenpart
Proceedings of the 22nd ACM SIGSAC conference on computer and communications …, 2015
2612015
Leakage-abuse attacks against order-revealing encryption
P Grubbs, K Sekniqi, V Bindschaedler, M Naveed, T Ristenpart
2017 IEEE Symposium on Security and Privacy (SP), 655-672, 2017
962017
Breaking web applications built on top of encrypted data
P Grubbs, R McPherson, M Naveed, T Ristenpart, V Shmatikov
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
572016
Why Your Encrypted Database Is Not Secure
P Grubbs, T Ristenpart, V Shmatikov
Hot Topics in Operating Systems, 2017
372017
GPU and CPU parallelization of honest-but-curious secure two-party computation
N Husted, S Myers, A Shelat, P Grubbs
Proceedings of the 29th Annual Computer Security Applications Conference …, 2013
372013
The tao of inference in privacy-protected databases
V Bindschaedler, P Grubbs, D Cash, T Ristenpart, V Shmatikov
Proceedings of the VLDB Endowment 11 (11), 1715-1728, 2018
232018
Pump up the volume: Practical database reconstruction from volume leakage on range queries
P Grubbs, MS Lacharité, B Minaud, KG Paterson
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
192018
Message franking via committing authenticated encryption
P Grubbs, J Lu, T Ristenpart
Annual International Cryptology Conference, 66-97, 2017
192017
Learning to reconstruct: Statistical learning theory and encrypted database attacks
P Grubbs, MS Lacharité, B Minaud, KG Paterson
2019 IEEE Symposium on Security and Privacy (SP), 1067-1083, 2019
162019
Encryption in the cloud using enterprise managed keys
K Narayan, P Grubbs
US Patent 9,413,730, 2016
142016
Fast message franking: From invisible salamanders to encryptment
Y Dodis, P Grubbs, T Ristenpart, J Woodage
Annual International Cryptology Conference, 155-186, 2018
102018
Searchable encryption for cloud storage
S Sarukkai, K Narayan, R Gupta, P Grubbs
US Patent 9,454,673, 2016
102016
Making encryption work in the cloud
A Boldyreva, P Grubbs
Network Security 2014 (10), 8-10, 2014
62014
Modifying an enciphering scheme after deployment
P Grubbs, T Ristenpart, Y Yarom
Annual International Conference on the Theory and Applications of …, 2017
52017
Side-channel attacks on shared search indexes
L Wang, P Grubbs, J Lu, V Bindschaedler, D Cash, T Ristenpart
2017 IEEE Symposium on Security and Privacy (SP), 673-692, 2017
42017
On deploying property-preserving encryption
P Grubbs
Real World Crypto, 2016
32016
Wildcard search in encrypted text using order preserving encryption
P Grubbs
US Patent 9,760,637, 2017
12017
Prefix search in encrypted text
P Grubbs
US Patent 9,679,155, 2017
12017
Order preserving tokenization
A Boldyreva, P Grubbs, N Chenette
US Patent 9,596,081, 2017
12017
Asymmetric message franking: content moderation for metadata-private end-to-end encryption
N Tyagi, P Grubbs, J Len, I Miers, T Ristenpart
Annual International Cryptology Conference, 222-250, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20