What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Bryan Parno
Google Scholar
40
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
TRex: Practical Type Reconstruction for Binary Code.
Jay Bosamiya
Maverick Woo
Bryan Parno
2025
conf/uss
Vest: Verified, Secure, High-Performance Parsing and Serialization for Rust.
Yi Cai
Pratap Singh
Zhengyao Lin
Jay Bosamiya
Joshua Gancher
Milijana Surbatovich
Bryan Parno
2025
conf/uss
Towards Practical, End-to-End Formally Verified X.509 Certificate Validators with Verdict.
Zhengyao Lin
Michael McLoughlin
Pratap Singh
Rory Brennan-Jones
Paul Hitchcox
Joshua Gancher
Bryan Parno
2025
conf/uss
OwlC: Compiling Security Protocols to Verified, Secure, High-Performance Libraries.
Pratap Singh
Joshua Gancher
Bryan Parno
2023
conf/ccs
Galápagos: Developing Verified Low Level Cryptography on Heterogeneous Hardwares.
Yi Zhou
Sydney Gibson
Sarah Cai
Menucha Winchell
Bryan Parno
2023
conf/crypto
Algebraic Reductions of Knowledge.
Abhiram Kothapalli
Bryan Parno
2023
conf/sp
Owl: Compositional Verification of Security Protocols via an Information-Flow Type System.
Joshua Gancher
Sydney Gibson
Pratap Singh
Samvid Dharanikota
Bryan Parno
2022
conf/ccs
Hammurabi: A Framework for Pluggable, Logic-Based X.509 Certificate Validation Policies.
James Larisch
Waqar Aqeel
Michael Lum
Yaelle Goldschlag
Leah Kannan
Kasra Torshizi
Yujie Wang
Taejoong Chung
Dave Levin
Bruce M. Maggs
Alan Mislove
Bryan Parno
Christo Wilson
2022
conf/uss
Provably-Safe Multilingual Software Sandboxing using WebAssembly.
Jay Bosamiya
Wen Shih Lim
Bryan Parno
2022
conf/ndss
Transparency Dictionaries with Succinct Proofs of Correct Operation.
Ioanna Tzialla
Abhiram Kothapalli
Bryan Parno
Srinath T. V. Setty
2022
conf/pkc
Storing and Retrieving Secrets on a Blockchain.
Vipul Goyal
Abhiram Kothapalli
Elisaweta Masserova
Bryan Parno
Yifan Song
2021
conf/sp
SoK: Computer-Aided Cryptography.
Manuel Barbosa
Gilles Barthe
Karthik Bhargavan
Bruno Blanchet
Cas Cremers
Kevin Liao
Bryan Parno
2021
conf/sp
A Security Model and Fully Verified Implementation for the IETF QUIC Record Layer.
Antoine Delignat-Lavaud
Cédric Fournet
Bryan Parno
Jonathan Protzenko
Tahina Ramananandro
Jay Bosamiya
Joseph Lallemand
Itsaka Rakotonirina
Yi Zhou
2021
conf/tcc
Blockchains Enable Non-interactive MPC.
Vipul Goyal
Elisaweta Masserova
Bryan Parno
Yifan Song
2020
conf/sp
EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider.
Jonathan Protzenko
Bryan Parno
Aymeric Fromherz
Chris Hawblitzel
Marina Polubelova
Karthikeyan Bhargavan
Benjamin Beurdouche
Joonwon Choi
Antoine Delignat-Lavaud
Cédric Fournet
Natalia Kulatova
Tahina Ramananandro
Aseem Rastogi
Nikhil Swamy
Christoph M. Wintersteiger
Santiago Zanella-Béguelin
2020
conf/acsac
Talek: Private Group Messaging with Hidden Access Patterns.
Raymond Cheng
William Scott
Elisaweta Masserova
Irene Zhang
Vipul Goyal
Thomas E. Anderson
Arvind Krishnamurthy
Bryan Parno
2020
conf/acsac
CAPS: Smoothly Transitioning to a More Resilient Web PKI.
Stephanos Matsumoto
Jay Bosamiya
Yucheng Dai
Paul C. van Oorschot
Bryan Parno
2017
conf/uss
Vale: Verifying High-Performance Cryptographic Assembly Code.
Barry Bond
Chris Hawblitzel
Manos Kapritsos
K. Rustan M. Leino
Jacob R. Lorch
Bryan Parno
Ashay Rane
Srinath T. V. Setty
Laure Thompson
2016
conf/ccs
Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data.
Dario Fiore
Cédric Fournet
Esha Ghosh
Markulf Kohlweiss
Olga Ohrimenko
Bryan Parno
2016
conf/sp
Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation.
Antoine Delignat-Lavaud
Cédric Fournet
Markulf Kohlweiss
Bryan Parno
2015
conf/sp
Geppetto: Versatile Verifiable Computation.
Craig Costello
Cédric Fournet
Jon Howell
Markulf Kohlweiss
Benjamin Kreuter
Michael Naehrig
Bryan Parno
Samee Zahur
2014
conf/sp
Permacoin: Repurposing Bitcoin Work for Data Preservation.
Andrew Miller
Ari Juels
Elaine Shi
Bryan Parno
Jonathan Katz
2013
conf/ccs
Fifth ACM cloud computing security workshop (CCSW 2013).
Ari Juels
Bryan Parno
2013
conf/ccs
The first workshop on language support for privacy-enhancing technologies (PETShop'13).
Martin Franz
Andreas Holzer
Rupak Majumdar
Bryan Parno
Helmut Veith
2013
conf/ccs
Pinocchio coin: building zerocoin from a succinct pairing-based proof system.
George Danezis
Cédric Fournet
Markulf Kohlweiss
Bryan Parno
2013
conf/sp
Pinocchio: Nearly Practical Verifiable Computation.
Bryan Parno
Jon Howell
Craig Gentry
Mariana Raykova
2013
conf/eurocrypt
Quadratic Span Programs and Succinct NIZKs without PCPs.
Rosario Gennaro
Craig Gentry
Bryan Parno
Mariana Raykova
2012
conf/sp
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems.
Franziska Roesner
Tadayoshi Kohno
Alexander Moshchuk
Bryan Parno
Helen J. Wang
Crispin Cowan
2012
conf/tcc
How to Delegate and Verify in Public: Verifiable Computation from Attribute-Based Encryption.
Bryan Parno
Mariana Raykova
Vinod Vaikuntanathan
2011
conf/sp
Memoir: Practical State Continuity for Protected Modules.
Bryan Parno
Jacob R. Lorch
John R. Douceur
James W. Mickens
Jonathan M. McCune
2010
conf/crypto
Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.
Rosario Gennaro
Craig Gentry
Bryan Parno
2010
conf/sp
Bootstrapping Trust in Commodity Computers.
Bryan Parno
Jonathan M. McCune
Adrian Perrig
2009
conf/sp
CLAMP: Practical Prevention of Large-Scale Data Leaks.
Bryan Parno
Jonathan M. McCune
Dan Wendlandt
David G. Andersen
Adrian Perrig
2008
conf/ccs
SNAPP: stateless network-authenticated path pinning.
Bryan Parno
Adrian Perrig
Dave G. Andersen
2008
conf/uss
Unidirectional Key Distribution Across Time and Space with Applications to RFID Security.
Ari Juels
Ravikanth Pappu
Bryan Parno
2008
conf/uss
Bootstrapping Trust in a "Trusted" Platform.
Bryan Parno
2008
conf/fc
Countermeasures against Government-Scale Monetary Forgery.
Alessandro Acquisti
Nicolas Christin
Bryan Parno
Adrian Perrig
2007
conf/sp
Minimal TCB Code Execution.
Jonathan M. McCune
Bryan Parno
Adrian Perrig
Michael K. Reiter
Arvind Seshadri
2006
conf/fc
Phoolproof Phishing Prevention.
Bryan Parno
Cynthia Kuo
Adrian Perrig
2005
conf/sp
Distributed Detection of Node Replication Attacks in Sensor Networks.
Bryan Parno
Adrian Perrig
Virgil D. Gligor
Coauthors
Abhiram Kothapalli
(3)
Adrian Perrig
(7)
Alan Mislove
(1)
Alessandro Acquisti
(1)
Alexander Moshchuk
(1)
Andreas Holzer
(1)
Andrew Miller
(1)
Antoine Delignat-Lavaud
(3)
Ari Juels
(3)
Arvind Krishnamurthy
(1)
Arvind Seshadri
(1)
Aseem Rastogi
(1)
Ashay Rane
(1)
Aymeric Fromherz
(1)
Barry Bond
(1)
Benjamin Beurdouche
(1)
Benjamin Kreuter
(1)
Bruce M. Maggs
(1)
Bruno Blanchet
(1)
Bryan Parno
(40)
Cas Cremers
(1)
Cédric Fournet
(6)
Chris Hawblitzel
(2)
Christo Wilson
(1)
Christoph M. Wintersteiger
(1)
Craig Costello
(1)
Craig Gentry
(3)
Crispin Cowan
(1)
Cynthia Kuo
(1)
Dan Wendlandt
(1)
Dario Fiore
(1)
Dave G. Andersen
(1)
Dave Levin
(1)
David G. Andersen
(1)
Elaine Shi
(1)
Elisaweta Masserova
(3)
Esha Ghosh
(1)
Franziska Roesner
(1)
George Danezis
(1)
Gilles Barthe
(1)
Helen J. Wang
(1)
Helmut Veith
(1)
Ioanna Tzialla
(1)
Irene Zhang
(1)
Itsaka Rakotonirina
(1)
Jacob R. Lorch
(2)
James Larisch
(1)
James W. Mickens
(1)
Jay Bosamiya
(5)
John R. Douceur
(1)
Jon Howell
(2)
Jonathan Katz
(1)
Jonathan M. McCune
(4)
Jonathan Protzenko
(2)
Joonwon Choi
(1)
Joseph Lallemand
(1)
Joshua Gancher
(4)
K. Rustan M. Leino
(1)
Karthik Bhargavan
(1)
Karthikeyan Bhargavan
(1)
Kasra Torshizi
(1)
Kevin Liao
(1)
Laure Thompson
(1)
Leah Kannan
(1)
Manos Kapritsos
(1)
Manuel Barbosa
(1)
Mariana Raykova
(3)
Marina Polubelova
(1)
Markulf Kohlweiss
(4)
Martin Franz
(1)
Maverick Woo
(1)
Menucha Winchell
(1)
Michael K. Reiter
(1)
Michael Lum
(1)
Michael McLoughlin
(1)
Michael Naehrig
(1)
Milijana Surbatovich
(1)
Natalia Kulatova
(1)
Nicolas Christin
(1)
Nikhil Swamy
(1)
Olga Ohrimenko
(1)
Paul C. van Oorschot
(1)
Paul Hitchcox
(1)
Pratap Singh
(4)
Ravikanth Pappu
(1)
Raymond Cheng
(1)
Rory Brennan-Jones
(1)
Rosario Gennaro
(2)
Rupak Majumdar
(1)
Samee Zahur
(1)
Samvid Dharanikota
(1)
Santiago Zanella-Béguelin
(1)
Sarah Cai
(1)
Srinath T. V. Setty
(2)
Stephanos Matsumoto
(1)
Sydney Gibson
(2)
Tadayoshi Kohno
(1)
Taejoong Chung
(1)
Tahina Ramananandro
(2)
Thomas E. Anderson
(1)
Vinod Vaikuntanathan
(1)
Vipul Goyal
(3)
Virgil D. Gligor
(1)
Waqar Aqeel
(1)
Wen Shih Lim
(1)
William Scott
(1)
Yaelle Goldschlag
(1)
Yi Cai
(1)
Yi Zhou
(2)
Yifan Song
(2)
Yucheng Dai
(1)
Yujie Wang
(1)
Zhengyao Lin
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to