Follow
Christina Garman
Christina Garman
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
Zerocash: Decentralized anonymous payments from Bitcoin
E Ben Sasson, A Chiesa, C Garman, M Green, I Miers, E Tromer, M Virza
Security and Privacy (SP), 2014 IEEE Symposium on, 459-474, 2014
25432014
Zerocoin: Anonymous distributed e-cash from bitcoin
I Miers, C Garman, M Green, AD Rubin
Security and Privacy (SP), 2013 IEEE Symposium on, 397-411, 2013
13942013
Charm: A framework for rapidly prototyping cryptosystems
JA Akinyele, C Garman, I Miers, MW Pagano, M Rushanan, M Green, ...
Journal of Cryptographic Engineering 3 (2), 111-128, 2013
7032013
Decentralized Anonymous Credentials.
C Garman, M Green, I Miers
Network and Distributed System Security (NDSS) Symposium 2014, 2014
1982014
Accountable privacy for decentralized anonymous payments
C Garman, M Green, I Miers
International Conference on Financial Cryptography and Data Security, 81-98, 2016
1452016
A systematic analysis of the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1152016
Dancing on the lip of the volcano: Chosen ciphertext attacks on apple imessage
C Garman, M Green, G Kaptchuk, I Miers, M Rushanan
25th {USENIX} Security Symposium ({USENIX} Security 16), 655-672, 2016
692016
Attacks Only Get Better: Password Recovery Attacks Against RC4 in {TLS}
C Garman, KG Paterson, T Van der Merwe
24th {USENIX} Security Symposium ({USENIX} Security 15), 113-128, 2015
662015
zk-creds: Flexible anonymous credentials from zksnarks and existing identity infrastructure
M Rosenberg, J White, C Garman, I Miers
2023 IEEE Symposium on Security and Privacy (SP), 790-808, 2023
412023
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes
JA Akinyele, C Garman, S Hohenberger
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
362015
Achieving keyless cdns with conclaves
S Herwig, C Garman, D Levin
29th {USENIX} Security Symposium ({USENIX} Security 20), 735-751, 2020
252020
Rational zero: Economic security for zerocoin with everlasting anonymity
C Garman, M Green, I Miers, AD Rubin
International Conference on Financial Cryptography and Data Security, 140-155, 2014
232014
SoK: SGX.Fail: How Stuff Gets eXposed
S van Schaik, A Seto, T Yurek, A Batori, B AlBassam, C Garman, ...
https://sgx.fail/, 2022
16*2022
Strengthening the Security of Operational Technology: Understanding Contemporary Bill of Materials
A Arora, V Wright, C Garman
JCIP The Journal of Critical Infrastructure Policy 3 (1), 111, 2022
92022
Bento: Safely bringing network function virtualization to Tor
M Reininger, A Arora, S Herwig, N Francino, J Hurst, C Garman, D Levin
Proceedings of the 2021 ACM SIGCOMM 2021 Conference, 821-835, 2021
92021
Where did I leave my keys?: lessons from the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Communications of the ACM 61 (11), 148-155, 2018
82018
A Worldwide View of Nation-state Internet Censorship
A Master, C Garman
Free and Open Communications on the Internet, 2023
62023
HACCLE: metaprogramming for secure multi-party computation
Y Bao, K Sundararajah, R Malik, Q Ye, C Wagner, N Jaber, F Wang, ...
Proceedings of the 20th ACM SIGPLAN International Conference on Generative …, 2021
52021
SoK: A Framework for and Analysis of Software Bill of Materials Tools
A Arora, VL Wright, C Garman
Idaho National Laboratory (INL), Idaho Falls, ID (United States), 2022
22022
Honest Majority Multi-Prover Interactive Arguments
AR Block, C Garman
Cryptology ePrint Archive, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20