Follow
Kevin Yeo
Kevin Yeo
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
Protecting accounts from credential stuffing with password breach alerting
K Thomas, J Pullman, K Yeo, A Raghunathan, PG Kelley, L Invernizzi, ...
28th USENIX Security Symposium (USENIX Security 19), 1556-1571, 2019
1302019
Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing
S Patel, G Persiano, K Yeo, M Yung
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
1052019
PanORAMa: Oblivious RAM with logarithmic overhead
S Patel, G Persiano, M Raykova, K Yeo
2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS …, 2018
922018
Communication–Computation Trade-offs in PIR
A Ali, T Lepoint, S Patel, M Raykova, P Schoppmann, K Seth, K Yeo
30th USENIX Security Symposium (USENIX Security 21), 1811-1828, 2021
732021
Private stateful information retrieval
S Patel, G Persiano, K Yeo
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
602018
Lower bounds for differentially private RAMs
G Persiano, K Yeo
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
312019
Symmetric searchable encryption with sharing and unsharing
S Patel, G Persiano, K Yeo
European Symposium on Research in Computer Security, 207-227, 2018
282018
Lower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe model
S Patel, G Persiano, K Yeo
Annual International Cryptology Conference, 433-463, 2020
26*2020
Lower bounds for oblivious near-neighbor search
KG Larsen, T Malkin, O Weinstein, K Yeo
Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete …, 2020
232020
Dynamic volume-hiding encrypted multi-maps with applications to searchable encryption
G Amjad, S Patel, G Persiano, K Yeo, M Yung
Proceedings on Privacy Enhancing Technologies 2023 (1), 417–436, 2023
222023
CacheShuffle: A family of oblivious shuffles
S Patel, G Persiano, K Yeo
45th International Colloquium on Automata, Languages, and Programming (ICALP …, 2018
21*2018
Lower bounds for multi-server oblivious RAMs
KG Larsen, M Simkin, K Yeo
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020
202020
What Storage Access Privacy is Achievable with Small Overhead?
S Patel, G Persiano, K Yeo
Proceedings of the 38th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of …, 2019
202019
Lower bounds for (batch) PIR with private preprocessing
K Yeo
Annual International Conference on the Theory and Applications of …, 2023
112023
Limits of preprocessing for single-server PIR
G Persiano, K Yeo
Proceedings of the 2022 Annual ACM-SIAM Symposium on Discrete Algorithms …, 2022
112022
SoK: SCT Auditing in Certificate Transparency
S Meiklejohn, J DeBlasio, D O'Brien, C Thompson, K Yeo, E Stark
Proceedings on Privacy Enhancing Technologies 2022 (3), 336–353, 2022
102022
Cuckoo hashing in cryptography: Optimal parameters, robustness and applications
K Yeo
Annual International Cryptology Conference, 197-230, 2023
82023
Don’t be Dense: Efficient Keyword PIR for Sparse Databases
S Patel, JY Seo, K Yeo
32nd USENIX Security Symposium (USENIX Security 23), 3853-3870, 2023
82023
Efficient boolean search over encrypted data with reduced leakage
S Patel, G Persiano, JY Seo, K Yeo
International Conference on the Theory and Application of Cryptology and …, 2021
82021
Lower bound framework for differentially private and oblivious data structures
G Persiano, K Yeo
Annual International Conference on the Theory and Applications of …, 2023
62023
The system can't perform the operation now. Try again later.
Articles 1–20