Follow
Christina Garman
Christina Garman
Verified email at purdue.edu - Homepage
Title
Cited by
Cited by
Year
Zerocash: Decentralized anonymous payments from Bitcoin
E Ben Sasson, A Chiesa, C Garman, M Green, I Miers, E Tromer, M Virza
Security and Privacy (SP), 2014 IEEE Symposium on, 459-474, 2014
27102014
Zerocoin: Anonymous distributed e-cash from bitcoin
I Miers, C Garman, M Green, AD Rubin
Security and Privacy (SP), 2013 IEEE Symposium on, 397-411, 2013
14552013
Charm: A framework for rapidly prototyping cryptosystems
JA Akinyele, C Garman, I Miers, MW Pagano, M Rushanan, M Green, ...
Journal of Cryptographic Engineering 3 (2), 111-128, 2013
7482013
Decentralized Anonymous Credentials.
C Garman, M Green, I Miers
Network and Distributed System Security (NDSS) Symposium 2014, 2014
2162014
Accountable privacy for decentralized anonymous payments
C Garman, M Green, I Miers
International Conference on Financial Cryptography and Data Security, 81-98, 2016
1582016
A systematic analysis of the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
1182016
Dancing on the lip of the volcano: Chosen ciphertext attacks on apple imessage
C Garman, M Green, G Kaptchuk, I Miers, M Rushanan
25th {USENIX} Security Symposium ({USENIX} Security 16), 655-672, 2016
702016
Attacks Only Get Better: Password Recovery Attacks Against RC4 in {TLS}
C Garman, KG Paterson, T Van der Merwe
24th {USENIX} Security Symposium ({USENIX} Security 15), 113-128, 2015
672015
zk-creds: Flexible anonymous credentials from zksnarks and existing identity infrastructure
M Rosenberg, J White, C Garman, I Miers
2023 IEEE Symposium on Security and Privacy (SP), 790-808, 2023
642023
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes
JA Akinyele, C Garman, S Hohenberger
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
392015
SoK: SGX.Fail: How Stuff Gets eXposed
S van Schaik, A Seto, T Yurek, A Batori, B AlBassam, D Genkin, A Miller, ...
2024 IEEE Symposium on Security and Privacy (SP), 2024
34*2024
Achieving keyless cdns with conclaves
S Herwig, C Garman, D Levin
29th {USENIX} Security Symposium ({USENIX} Security 20), 735-751, 2020
272020
Rational zero: Economic security for zerocoin with everlasting anonymity
C Garman, M Green, I Miers, AD Rubin
International Conference on Financial Cryptography and Data Security, 140-155, 2014
232014
Strengthening the Security of Operational Technology: Understanding Contemporary Bill of Materials
A Arora, V Wright, C Garman
JCIP The Journal of Critical Infrastructure Policy 3 (1), 111, 2022
152022
A Worldwide View of Nation-state Internet Censorship
A Master, C Garman
Free and Open Communications on the Internet, 2023
142023
Bento: Safely bringing network function virtualization to Tor
M Reininger, A Arora, S Herwig, N Francino, J Hurst, C Garman, D Levin
Proceedings of the 2021 ACM SIGCOMM 2021 Conference, 821-835, 2021
112021
Where did I leave my keys?: lessons from the Juniper Dual EC incident
S Checkoway, J Maskiewicz, C Garman, J Fried, S Cohney, M Green, ...
Communications of the ACM 61 (11), 148-155, 2018
92018
HACCLE: metaprogramming for secure multi-party computation
Y Bao, K Sundararajah, R Malik, Q Ye, C Wagner, N Jaber, F Wang, ...
Proceedings of the 20th ACM SIGPLAN International Conference on Generative …, 2021
72021
A WireGuard Exploration
A Master, C Garman
42021
Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor
H Yavarzadeh, A Agarwal, M Christman, C Garman, D Genkin, A Kwong, ...
Proceedings of the 29th ACM International Conference on Architectural …, 2024
32024
The system can't perform the operation now. Try again later.
Articles 1–20