What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kevin Yeo
Google Scholar
24
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/popets
RSA Blind Signatures with Public Metadata.
Ghous Amjad
Kevin Yeo
Moti Yung
2025
conf/eurocrypt
Fine-Grained Complexity in a World Without Cryptography.
Josh Alman
Yizhi Huang
Kevin Yeo
2025
conf/eurocrypt
Plinko: Single-Server PIR with Efficient Updates via Invertible PRFs.
Alexander Hoover
Sarvar Patel
Giuseppe Persiano
Kevin Yeo
2025
conf/eurocrypt
Weakly Super-Invertible Matrices and Constant Communication Dishonest Majority MPC.
Alexander Bienstock
Kevin Yeo
2024
conf/ccs
Efficient Secret Sharing for Large-Scale Applications.
Sarvar Patel
Giuseppe Persiano
Joon Young Seo
Kevin Yeo
2024
conf/uss
Batch PIR and Labeled PSI with Oblivious Ciphertext Compression.
Alexander Bienstock
Sarvar Patel
Joon Young Seo
Kevin Yeo
2023
journals/popets
Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption.
Ghous Amjad
Sarvar Patel
Giuseppe Persiano
Kevin Yeo
Moti Yung
2023
conf/uss
Don't be Dense: Efficient Keyword PIR for Sparse Databases.
Sarvar Patel
Joon Young Seo
Kevin Yeo
2023
conf/uss
Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume-Hiding Multi-Maps.
Alexander Bienstock
Sarvar Patel
Joon Young Seo
Kevin Yeo
2023
conf/crypto
Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications.
Kevin Yeo
2023
conf/crypto
Limits of Breach-Resistant and Snapshot-Oblivious RAMs.
Giuseppe Persiano
Kevin Yeo
2023
conf/eurocrypt
Lower Bounds for (Batch) PIR with Private Preprocessing.
Kevin Yeo
2023
conf/eurocrypt
Lower Bound Framework for Differentially Private and Oblivious Data Structures.
Giuseppe Persiano
Kevin Yeo
2022
journals/popets
SoK: SCT Auditing in Certificate Transparency.
Sarah Meiklejohn
Joe DeBlasio
Devon O'Brien
Chris Thompson
Kevin Yeo
Emily Stark
2021
conf/uss
Communication-Computation Trade-offs in PIR.
Asra Ali
Tancrède Lepoint
Sarvar Patel
Mariana Raykova
Phillipp Schoppmann
Karn Seth
Kevin Yeo
2021
conf/asiacrypt
Efficient Boolean Search over Encrypted Data with Reduced Leakage.
Sarvar Patel
Giuseppe Persiano
Joon Young Seo
Kevin Yeo
2021
conf/tcc
Forward Secret Encrypted RAM: Lower Bounds and Applications.
Alexander Bienstock
Yevgeniy Dodis
Kevin Yeo
2020
conf/crypto
Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model.
Sarvar Patel
Giuseppe Persiano
Kevin Yeo
2020
conf/tcc
Lower Bounds for Multi-server Oblivious RAMs.
Kasper Green Larsen
Mark Simkin
Kevin Yeo
2019
conf/ccs
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing.
Sarvar Patel
Giuseppe Persiano
Kevin Yeo
Moti Yung
2019
conf/uss
Protecting accounts from credential stuffing with password breach alerting.
Kurt Thomas
Jennifer Pullman
Kevin Yeo
Ananth Raghunathan
Patrick Gage Kelley
Luca Invernizzi
Borbala Benko
Tadek Pietraszek
Sarvar Patel
Dan Boneh
Elie Bursztein
2019
conf/eurocrypt
Lower Bounds for Differentially Private RAMs.
Giuseppe Persiano
Kevin Yeo
2018
conf/ccs
Private Stateful Information Retrieval.
Sarvar Patel
Giuseppe Persiano
Kevin Yeo
2018
conf/esorics
Symmetric Searchable Encryption with Sharing and Unsharing.
Sarvar Patel
Giuseppe Persiano
Kevin Yeo
Coauthors
Alexander Bienstock
(4)
Alexander Hoover
(1)
Ananth Raghunathan
(1)
Asra Ali
(1)
Borbala Benko
(1)
Chris Thompson
(1)
Dan Boneh
(1)
Devon O'Brien
(1)
Elie Bursztein
(1)
Emily Stark
(1)
Ghous Amjad
(2)
Giuseppe Persiano
(11)
Jennifer Pullman
(1)
Joe DeBlasio
(1)
Joon Young Seo
(5)
Josh Alman
(1)
Karn Seth
(1)
Kasper Green Larsen
(1)
Kevin Yeo
(24)
Kurt Thomas
(1)
Luca Invernizzi
(1)
Mariana Raykova
(1)
Mark Simkin
(1)
Moti Yung
(3)
Patrick Gage Kelley
(1)
Phillipp Schoppmann
(1)
Sarah Meiklejohn
(1)
Sarvar Patel
(13)
Tadek Pietraszek
(1)
Tancrède Lepoint
(1)
Yevgeniy Dodis
(1)
Yizhi Huang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to