Henry Corrigan-Gibbs
Henry Corrigan-Gibbs
MIT CSAIL
Verified email at csail.mit.edu - Homepage
Title
Cited by
Cited by
Year
Dissent: accountable anonymous group messaging
H Corrigan-Gibbs, B Ford
Proceedings of the 17th ACM conference on Computer and communications …, 2010
2092010
Dissent in Numbers: Making Strong Anonymity Scale.
DI Wolinsky, H Corrigan-Gibbs, B Ford, A Johnson
OSDI, 179-182, 2012
2012012
Riposte: An Anonymous Messaging System Handling Millions of Users
H Corrigan-Gibbs, D Boneh, D Mazières
IEEE Security and Privacy, 2015
1552015
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics
H Corrigan-Gibbs, D Boneh
14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), 0
119*
Proactively accountable anonymous messaging in Verdict
H Corrigan-Gibbs, DI Wolinsky, B Ford
USENIX Security, 2013
732013
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks
D Boneh, H Corrigan-Gibbs, S Schechter
Asiacrypt, 2016
64*2016
Atom: Horizontally Scaling Strong Anonymity
A Kwon, H Corrigan-Gibbs, S Devadas, B Ford
SOSP, 2017
54*2017
Deterring Cheating in Online Environments
H Corrigan-Gibbs, N Gupta, C Northcutt, E Cutrell, W Thies
ACM Transactions on Computer-Human Interaction (TOCHI) 22 (6), 28, 2015
532015
Scalable anonymous group communication in the anytrust model
DI Wolinsky, H Corrigan-Gibbs, B Ford, A Johnson
European Workshop on System Security (EuroSec) 4, 2012
362012
Trust but Verify: Auditing the Secure Internet of Things
J Wilson, RS Wahby, H Corrigan-Gibbs, D Boneh, P Levis, K Winstein
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
342017
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs
D Boneh, E Boyle, H Corrigan-Gibbs, N Gilboa, Y Ishai
CRYPTO, 2019
29*2019
The discrete-logarithm problem with preprocessing
H Corrigan-Gibbs, D Kogan
EUROCRYPT, 415-447, 2018
232018
Security analysis of accountable anonymity in Dissent
E Syta, H Corrigan-Gibbs, SC Weng, D Wolinsky, B Ford, A Johnson
ACM Transactions on Information and System Security (TISSEC) 17 (1), 1-35, 2014
23*2014
Ensuring high-quality randomness in cryptographic key generation
H Corrigan-Gibbs, W Mu, D Boneh, B Ford
CCS, 685-696, 2013
222013
Stickler: Defending against Malicious Content Distribution Networks in an Unmodified Browser
A Levy, H Corrigan-Gibbs, D Boneh
IEEE Security & Privacy 14 (2), 22-28, 2016
20*2016
FlashPatch: spreading software updates over flash drives in under-connected regions
H Corrigan-Gibbs, J Chen
Proceedings of the Fifth ACM Symposium on Computing for Development, 1-10, 2014
162014
Bivariate Polynomials Modulo Composites and their Applications
D Boneh, H Corrigan-Gibbs
Advances in Cryptology–ASIACRYPT 2014, 42-62, 2014
162014
Private information retrieval with sublinear online time
H Corrigan-Gibbs, D Kogan
Annual International Conference on the Theory and Applications of …, 2020
152020
Recommendations for randomness in the operating system, or how to keep evil children out of your pool and other random facts
H Corrigan-Gibbs, S Jana
15th Workshop on Hot Topics in Operating Systems (HotOS {XV}), 2015
152015
The function-inversion problem: Barriers and opportunities
H Corrigan-Gibbs, D Kogan
Theory of Cryptography Conference, 393-421, 2019
122019
The system can't perform the operation now. Try again later.
Articles 1–20