Protecting accounts from credential stuffing with password breach alerting K Thomas, J Pullman, K Yeo, A Raghunathan, PG Kelley, L Invernizzi, ... 28th USENIX Security Symposium (USENIX Security 19), 1556-1571, 2019 | 161 | 2019 |
Mitigating leakage in secure cloud-hosted data structures: Volume-hiding for multi-maps via hashing S Patel, G Persiano, K Yeo, M Yung Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019 | 127 | 2019 |
PanORAMa: Oblivious RAM with logarithmic overhead S Patel, G Persiano, M Raykova, K Yeo 2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS …, 2018 | 102 | 2018 |
Communication–Computation Trade-offs in PIR A Ali, T Lepoint, S Patel, M Raykova, P Schoppmann, K Seth, K Yeo 30th USENIX Security Symposium (USENIX Security 21), 1811-1828, 2021 | 87 | 2021 |
Private stateful information retrieval S Patel, G Persiano, K Yeo Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018 | 70 | 2018 |
Symmetric searchable encryption with sharing and unsharing S Patel, G Persiano, K Yeo European Symposium on Research in Computer Security, 207-227, 2018 | 34 | 2018 |
Lower bounds for differentially private RAMs G Persiano, K Yeo Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019 | 33 | 2019 |
Dynamic volume-hiding encrypted multi-maps with applications to searchable encryption G Amjad, S Patel, G Persiano, K Yeo, M Yung Proceedings on Privacy Enhancing Technologies 2023 (1), 417–436, 2023 | 28 | 2023 |
Lower bounds for encrypted multi-maps and searchable encryption in the leakage cell probe model S Patel, G Persiano, K Yeo Annual International Cryptology Conference, 433-463, 2020 | 27* | 2020 |
Lower bounds for oblivious near-neighbor search KG Larsen, T Malkin, O Weinstein, K Yeo Proceedings of the Fourteenth Annual ACM-SIAM Symposium on Discrete …, 2020 | 24 | 2020 |
Lower bounds for multi-server oblivious RAMs KG Larsen, M Simkin, K Yeo Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020 | 23 | 2020 |
Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume-Hiding Multi-Maps A Bienstock, S Patel, JY Seo, K Yeo 32nd USENIX Security Symposium (USENIX Security 23), 301-318, 2023 | 21 | 2023 |
What Storage Access Privacy is Achievable with Small Overhead? S Patel, G Persiano, K Yeo Proceedings of the 38th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of …, 2019 | 21 | 2019 |
CacheShuffle: A family of oblivious shuffles S Patel, G Persiano, K Yeo 45th International Colloquium on Automata, Languages, and Programming (ICALP …, 2018 | 21* | 2018 |
Lower bounds for (batch) PIR with private preprocessing K Yeo Annual International Conference on the Theory and Applications of …, 2023 | 17 | 2023 |
Cuckoo hashing in cryptography: Optimal parameters, robustness and applications K Yeo Annual International Cryptology Conference, 197-230, 2023 | 16 | 2023 |
Limits of preprocessing for single-server PIR G Persiano, K Yeo Proceedings of the 2022 Annual ACM-SIAM Symposium on Discrete Algorithms …, 2022 | 15 | 2022 |
Don’t be Dense: Efficient Keyword PIR for Sparse Databases S Patel, JY Seo, K Yeo 32nd USENIX Security Symposium (USENIX Security 23), 3853-3870, 2023 | 13 | 2023 |
Efficient boolean search over encrypted data with reduced leakage S Patel, G Persiano, JY Seo, K Yeo International Conference on the Theory and Application of Cryptology and …, 2021 | 12 | 2021 |
SoK: SCT Auditing in Certificate Transparency S Meiklejohn, J DeBlasio, D O'Brien, C Thompson, K Yeo, E Stark Proceedings on Privacy Enhancing Technologies 2022 (3), 336–353, 2022 | 11 | 2022 |