Export 6 results:
Filters: Author is Jonathan Katz  [Clear All Filters]
Maimon D, Becker M, Patil S, Katz J.  2017.  Self-Protective Behaviors Over Public WiFi Networks. The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2017). :69--76.
Zhang Y, Katz J, Papamanthou C.  2016.  All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption. 25th USENIX Security Symposium (USENIX Security 16). :707--720.
Zhu R, Huang Y, Katz J, Shelat A.  2016.  The Cut-and-Choose Game and Its Application to Cryptographic Protocols. 25th USENIX Security Symposium (USENIX Security 16). :1085--1100.
Huang Y, Evans D, Katz J, Malka L.  2011.  Faster Secure Two-Party Computation Using Garbled Circuits. 20th USENIX Security Symposium (USENIX Security 11).
Katz J, Schneier B.  2000.  A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols. 9th USENIX Security Symposium (USENIX Security 00).