USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 6 results:
Filters: Author is Jonathan Katz [Clear All Filters]
Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning. 30th USENIX Security Symposium (USENIX Security 21). :501--518.
.
2021. Self-Protective Behaviors Over Public WiFi Networks. The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2017). :69--76.
.
2017. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption. 25th USENIX Security Symposium (USENIX Security 16). :707--720.
.
2016. The Cut-and-Choose Game and Its Application to Cryptographic Protocols. 25th USENIX Security Symposium (USENIX Security 16). :1085--1100.
.
2016. Faster Secure Two-Party Computation Using Garbled Circuits. 20th USENIX Security Symposium (USENIX Security 11).
.
2011. A Chosen Ciphertext Attack Against Several E-Mail Encryption Protocols. 9th USENIX Security Symposium (USENIX Security 00).
.
2000.