Följ
Julia Len
Julia Len
Verifierad e-postadress på csail.mit.edu - Startsida
Titel
Citeras av
Citeras av
År
Partitioning oracle attacks
J Len, P Grubbs, T Ristenpart
30th USENIX security symposium (USENIX Security 21), 195-212, 2021
582021
Asymmetric message franking: Content moderation for metadata-private end-to-end encryption
N Tyagi, P Grubbs, J Len, I Miers, T Ristenpart
Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019
482019
Interactive network visualization in Jupyter notebooks: visJS2jupyter
SB Rosenthal, J Len, M Webster, A Gary, A Birmingham, KM Fisch
Bioinformatics 34 (1), 126-128, 2018
222018
Fuzzy message detection
G Beck, J Len, I Miers, M Green
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
192021
Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More
S Menda, J Len, P Grubbs, T Ristenpart
Annual International Conference on the Theory and Applications of …, 2023
172023
E2e encryption for zoom meetings
J Blum, S Booth, O Gal, M Krohn, J Len, K Lyons, A Marcedone, M Maxim, ...
Zoom Video Commun., Inc., San Jose, CA, Tech. Rep. Version 2 (1), 2020
132020
Interoperability in end-to-end encrypted messaging
J Len, E Ghosh, P Grubbs, P Rösler
Cryptology ePrint Archive, 2023
102023
Better than advertised: Improved collision-resistance guarantees for md-based hash functions
M Bellare, J Jaeger, J Len
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
92017
{OPTIKS}: An Optimized Key Transparency System
J Len, M Chase, E Ghosh, K Laine, RC Moreno
33rd USENIX Security Symposium (USENIX Security 24), 4355-4372, 2024
72024
Orca: Blocklisting in {Sender-Anonymous} Messaging
N Tyagi, J Len, I Miers, T Ristenpart
31st USENIX Security Symposium (USENIX Security 22), 2299-2316, 2022
62022
ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency
J Len, M Chase, E Ghosh, D Jost, B Kesavan, A Marcedone
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
52023
Authenticated encryption with key identification
J Len, P Grubbs, T Ristenpart
International Conference on the Theory and Application of Cryptology and …, 2022
52022
E2E Encryption for Zoom Meetings. White Paper–Github Repository zoom/zoome2e-whitepaper, Version 3.2
J Blum, S Booth, B Chen, O Gal, M Krohn, J Len, K Lyons, A Marcedone, ...
52022
Zoom end-to-end encryption whitepaper
J Blum, S Booth, B Chen, O Gal, M Krohn, J Len, K Lyons, A Marcedone, ...
Github, San Francisco, White Paper, 2020
52020
Zoom Cryptography Whitepaper
J Blum, S Booth, B Chen, O Gal, M Krohn, J Len, K Lyons, A Marcedone, ...
32022
Designing Secure-by-Default Cryptography for Computer Systems
J Len
Cornell University, 2024
2024
Flexible Authenticated Encryption
S Menda, J Len, VT Hoang, M Bellare, T Ristenpart
2023
Context Discovery and Commitment Attacks
S Menda, J Len
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–18