Follow
Christina Garman
Christina Garman
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
Zerocash: Decentralized anonymous payments from Bitcoin
E Ben Sasson, A Chiesa, C Garman, M Green, I Miers, E Tromer, M Virza
Security and Privacy (SP), 2014 IEEE Symposium on, 459-474, 2014
19452014
Zerocoin: Anonymous distributed e-cash from bitcoin
I Miers, C Garman, M Green, AD Rubin
Security and Privacy (SP), 2013 IEEE Symposium on, 397-411, 2013
11752013
Charm: A framework for rapidly prototyping cryptosystems
JA Akinyele, C Garman, I Miers, MW Pagano, M Rushanan, M Green, ...
Journal of Cryptographic Engineering 3 (2), 111-128, 2013
5272013
Decentralized Anonymous Credentials.
C Garman, M Green, I Miers
Network and Distributed System Security (NDSS) Symposium 2014, 2014
1512014
Accountable privacy for decentralized anonymous payments
C Garman, M Green, I Miers
International Conference on Financial Cryptography and Data Security, 81-98, 2016
1092016
A systematic analysis of the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
942016
Attacks Only Get Better: Password Recovery Attacks Against RC4 in {TLS}
C Garman, KG Paterson, T Van der Merwe
24th {USENIX} Security Symposium ({USENIX} Security 15), 113-128, 2015
572015
Dancing on the lip of the volcano: Chosen ciphertext attacks on apple imessage
C Garman, M Green, G Kaptchuk, I Miers, M Rushanan
25th {USENIX} Security Symposium ({USENIX} Security 16), 655-672, 2016
562016
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes
JA Akinyele, C Garman, S Hohenberger
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
322015
Rational zero: Economic security for zerocoin with everlasting anonymity
C Garman, M Green, I Miers, AD Rubin
International Conference on Financial Cryptography and Data Security, 140-155, 2014
232014
Achieving keyless cdns with conclaves
S Herwig, C Garman, D Levin
29th {USENIX} Security Symposium ({USENIX} Security 20), 735-751, 2020
172020
Charm: A tool for rapid cryptographic prototyping
JA Akinyele, G Belvin, C Garman, M Pagano, M Rushanan, P Martin, ...
72012
Where did I leave my keys?: lessons from the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Communications of the ACM 61 (11), 148-155, 2018
52018
: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure
M Rosenberg, J White, C Garman, I Miers
Cryptology ePrint Archive, 2022
32022
Bento: Safely bringing network function virtualization to Tor
M Reininger, A Arora, S Herwig, N Francino, J Hurst, C Garman, D Levin
Proceedings of the 2021 ACM SIGCOMM 2021 Conference, 821-835, 2021
32021
Strengthening the Security of Operational Technology: Understanding Contemporary Bill of Materials
A Arora, V Wright, C Garman
JCIP The Journal of Critical Infrastructure Policy 3 (1), 111, 2022
2022
Honest Majority Multi-Prover Interactive Arguments
AR Block, C Garman
Cryptology ePrint Archive, 2022
2022
HACCLE: metaprogramming for secure multi-party computation
Y Bao, K Sundararajah, R Malik, Q Ye, C Wagner, N Jaber, F Wang, ...
Proceedings of the 20th ACM SIGPLAN International Conference on Generative …, 2021
2021
Bento: Bringing Network Function Virtualization to Tor
M Reininger, A Arora, S Herwig, N Francino, C Garman, D Levin
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
2020
HACCLE: Metaprogramming for Secure Multi-Party Computation--Extended Version
Y Bao, K Sundararajah, R Malik, Q Ye, C Wagner, N Jaber, F Wang, ...
arXiv preprint arXiv:2009.01489, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20