Henry Corrigan-Gibbs
Henry Corrigan-Gibbs
Verified email at csail.mit.edu - Homepage
TitleCited byYear
Dissent: accountable anonymous group messaging
H Corrigan-Gibbs, B Ford
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Dissent in Numbers: Making Strong Anonymity Scale.
DI Wolinsky, H Corrigan-Gibbs, B Ford, A Johnson
OSDI, 179-182, 2012
Riposte: An Anonymous Messaging System Handling Millions of Users
H Corrigan-Gibbs, D Boneh, D Mazières
IEEE Security and Privacy, 2015
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics
H Corrigan-Gibbs, D Boneh
14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17), 0
Proactively accountable anonymous messaging in Verdict
H Corrigan-Gibbs, DI Wolinsky, B Ford
USENIX Security, 2013
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks
D Boneh, H Corrigan-Gibbs, S Schechter
Asiacrypt, 2016
Atom: Horizontally Scaling Strong Anonymity
A Kwon, H Corrigan-Gibbs, S Devadas, B Ford
SOSP, 2017
Scalable anonymous group communication in the anytrust model
DI Wolinsky, H Corrigan-Gibbs, B Ford, A Johnson
European Workshop on System Security (EuroSec) 4, 2012
Deterring Cheating in Online Environments
H Corrigan-Gibbs, N Gupta, C Northcutt, E Cutrell, W Thies
ACM Transactions on Computer-Human Interaction (TOCHI) 22 (6), 28, 2015
Security analysis of accountable anonymity in Dissent
E Syta, H Corrigan-Gibbs, SC Weng, D Wolinsky, B Ford, A Johnson
ACM Transactions on Information and System Security (TISSEC) 17 (1), 1-35, 2014
Trust but Verify: Auditing the Secure Internet of Things
J Wilson, RS Wahby, H Corrigan-Gibbs, D Boneh, P Levis, K Winstein
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
Ensuring high-quality randomness in cryptographic key generation
H Corrigan-Gibbs, W Mu, D Boneh, B Ford
CCS, 685-696, 2013
FlashPatch: spreading software updates over flash drives in under-connected regions
H Corrigan-Gibbs, J Chen
Proceedings of the Fifth ACM Symposium on Computing for Development, 1-10, 2014
Bivariate Polynomials Modulo Composites and their Applications
D Boneh, H Corrigan-Gibbs
Advances in Cryptology–ASIACRYPT 2014, 42-62, 2014
The discrete-logarithm problem with preprocessing
H Corrigan-Gibbs, D Kogan
EUROCRYPT, 415-447, 2018
Stickler: Defending against Malicious Content Distribution Networks in an Unmodified Browser
A Levy, H Corrigan-Gibbs, D Boneh
IEEE Security & Privacy 14 (2), 22-28, 2016
Recommendations for randomness in the operating system, or how to keep evil children out of your pool and other random facts
H Corrigan-Gibbs, S Jana
15th Workshop on Hot Topics in Operating Systems (HotOS {XV}), 2015
Measuring and Maximizing the Effectiveness of Honor Codes in Online Courses
H Corrigan-Gibbs, N Gupta, C Northcutt, E Cutrell, W Thies
Proceedings of the Second (2015) ACM Conference on Learning@ Scale, 223-228, 2015
Quantum Operating Systems
H Corrigan-Gibbs, DJ Wu, D Boneh
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 76-81, 2017
Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs
D Boneh, E Boyle, H Corrigan-Gibbs, N Gilboa, Y Ishai
CRYPTO, 2019
The system can't perform the operation now. Try again later.
Articles 1–20