Zerocash: Decentralized anonymous payments from Bitcoin E Ben Sasson, A Chiesa, C Garman, M Green, I Miers, E Tromer, M Virza Security and Privacy (SP), 2014 IEEE Symposium on, 459-474, 2014 | 2024 | 2014 |
Zerocoin: Anonymous distributed e-cash from bitcoin I Miers, C Garman, M Green, AD Rubin Security and Privacy (SP), 2013 IEEE Symposium on, 397-411, 2013 | 1209 | 2013 |
Charm: A framework for rapidly prototyping cryptosystems JA Akinyele, C Garman, I Miers, MW Pagano, M Rushanan, M Green, ... Journal of Cryptographic Engineering 3 (2), 111-128, 2013 | 560 | 2013 |
Decentralized Anonymous Credentials. C Garman, M Green, I Miers Network and Distributed System Security (NDSS) Symposium 2014, 2014 | 153 | 2014 |
Accountable privacy for decentralized anonymous payments C Garman, M Green, I Miers International Conference on Financial Cryptography and Data Security, 81-98, 2016 | 116 | 2016 |
A systematic analysis of the Juniper Dual EC incident S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ... Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 95 | 2016 |
Attacks Only Get Better: Password Recovery Attacks Against RC4 in {TLS} C Garman, KG Paterson, T Van der Merwe 24th {USENIX} Security Symposium ({USENIX} Security 15), 113-128, 2015 | 56 | 2015 |
Dancing on the lip of the volcano: Chosen ciphertext attacks on apple imessage C Garman, M Green, G Kaptchuk, I Miers, M Rushanan 25th {USENIX} Security Symposium ({USENIX} Security 16), 655-672, 2016 | 55 | 2016 |
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes JA Akinyele, C Garman, S Hohenberger Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 31 | 2015 |
Rational zero: Economic security for zerocoin with everlasting anonymity C Garman, M Green, I Miers, AD Rubin International Conference on Financial Cryptography and Data Security, 140-155, 2014 | 22 | 2014 |
Achieving keyless cdns with conclaves S Herwig, C Garman, D Levin 29th {USENIX} Security Symposium ({USENIX} Security 20), 735-751, 2020 | 18 | 2020 |
: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure M Rosenberg, J White, C Garman, I Miers Cryptology ePrint Archive, 2022 | 7 | 2022 |
Charm: A tool for rapid cryptographic prototyping JA Akinyele, G Belvin, C Garman, M Pagano, M Rushanan, P Martin, ... | 7 | 2012 |
Where did I leave my keys?: lessons from the Juniper Dual EC incident S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ... Communications of the ACM 61 (11), 148-155, 2018 | 5 | 2018 |
Bento: Safely bringing network function virtualization to Tor M Reininger, A Arora, S Herwig, N Francino, J Hurst, C Garman, D Levin Proceedings of the 2021 ACM SIGCOMM 2021 Conference, 821-835, 2021 | 4 | 2021 |
HACCLE: metaprogramming for secure multi-party computation Y Bao, K Sundararajah, R Malik, Q Ye, C Wagner, N Jaber, F Wang, ... Proceedings of the 20th ACM SIGPLAN International Conference on Generative …, 2021 | 1 | 2021 |
Strengthening the Security of Operational Technology: Understanding Contemporary Bill of Materials A Arora, V Wright, C Garman JCIP The Journal of Critical Infrastructure Policy 3 (1), 111, 2022 | | 2022 |
Honest Majority Multi-Prover Interactive Arguments AR Block, C Garman Cryptology ePrint Archive, 2022 | | 2022 |
Bento: Bringing Network Function Virtualization to Tor M Reininger, A Arora, S Herwig, N Francino, C Garman, D Levin Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | | 2020 |
HACCLE: Metaprogramming for Secure Multi-Party Computation--Extended Version Y Bao, K Sundararajah, R Malik, Q Ye, C Wagner, N Jaber, F Wang, ... arXiv preprint arXiv:2009.01489, 2020 | | 2020 |