Partitioning oracle attacks J Len, P Grubbs, T Ristenpart 30th USENIX security symposium (USENIX Security 21), 195-212, 2021 | 58 | 2021 |
Asymmetric message franking: Content moderation for metadata-private end-to-end encryption N Tyagi, P Grubbs, J Len, I Miers, T Ristenpart Advances in Cryptology–CRYPTO 2019: 39th Annual International Cryptology …, 2019 | 48 | 2019 |
Interactive network visualization in Jupyter notebooks: visJS2jupyter SB Rosenthal, J Len, M Webster, A Gary, A Birmingham, KM Fisch Bioinformatics 34 (1), 126-128, 2018 | 22 | 2018 |
Fuzzy message detection G Beck, J Len, I Miers, M Green Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 19 | 2021 |
Context Discovery and Commitment Attacks: How to Break CCM, EAX, SIV, and More S Menda, J Len, P Grubbs, T Ristenpart Annual International Conference on the Theory and Applications of …, 2023 | 17 | 2023 |
E2e encryption for zoom meetings J Blum, S Booth, O Gal, M Krohn, J Len, K Lyons, A Marcedone, M Maxim, ... Zoom Video Commun., Inc., San Jose, CA, Tech. Rep. Version 2 (1), 2020 | 13 | 2020 |
Interoperability in end-to-end encrypted messaging J Len, E Ghosh, P Grubbs, P Rösler Cryptology ePrint Archive, 2023 | 10 | 2023 |
Better than advertised: Improved collision-resistance guarantees for md-based hash functions M Bellare, J Jaeger, J Len Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 9 | 2017 |
{OPTIKS}: An Optimized Key Transparency System J Len, M Chase, E Ghosh, K Laine, RC Moreno 33rd USENIX Security Symposium (USENIX Security 24), 4355-4372, 2024 | 7 | 2024 |
Orca: Blocklisting in {Sender-Anonymous} Messaging N Tyagi, J Len, I Miers, T Ristenpart 31st USENIX Security Symposium (USENIX Security 22), 2299-2316, 2022 | 6 | 2022 |
ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency J Len, M Chase, E Ghosh, D Jost, B Kesavan, A Marcedone Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 5 | 2023 |
Authenticated encryption with key identification J Len, P Grubbs, T Ristenpart International Conference on the Theory and Application of Cryptology and …, 2022 | 5 | 2022 |
E2E Encryption for Zoom Meetings. White Paper–Github Repository zoom/zoome2e-whitepaper, Version 3.2 J Blum, S Booth, B Chen, O Gal, M Krohn, J Len, K Lyons, A Marcedone, ... | 5 | 2022 |
Zoom end-to-end encryption whitepaper J Blum, S Booth, B Chen, O Gal, M Krohn, J Len, K Lyons, A Marcedone, ... Github, San Francisco, White Paper, 2020 | 5 | 2020 |
Zoom Cryptography Whitepaper J Blum, S Booth, B Chen, O Gal, M Krohn, J Len, K Lyons, A Marcedone, ... | 3 | 2022 |
Designing Secure-by-Default Cryptography for Computer Systems J Len Cornell University, 2024 | | 2024 |
Flexible Authenticated Encryption S Menda, J Len, VT Hoang, M Bellare, T Ristenpart | | 2023 |
Context Discovery and Commitment Attacks S Menda, J Len | | |