[go: up one dir, main page]

Follow
Ariel Hamlin
Ariel Hamlin
Northeastern University, MIT Lincoln Lab
Verified email at ll.mit.edu
Title
Cited by
Cited by
Year
Sok: Cryptographically protected database search
B Fuller, M Varia, A Yerukhimovich, E Shen, A Hamlin, V Gadepally, ...
2017 IEEE Symposium on Security and Privacy (SP), 172-191, 2017
1812017
Multi-key searchable encryption, revisited
A Hamlin, A Shelat, M Weiss, D Wichs
IACR international workshop on public key cryptography, 95-124, 2018
542018
Private anonymous data access
A Hamlin, R Ostrovsky, M Weiss, D Wichs
Annual International Conference on the Theory and Applications of …, 2019
462019
Cryptography for Big Data Security.
A Hamlin, N Schear, E Shen, M Varia, S Yakoubov, A Yerukhimovich
IACR Cryptol. ePrint Arch. 2016, 12, 2016
342016
Unifying leakage classes: Simulatable leakage and pseudoentropy
B Fuller, A Hamlin
International Conference on Information Theoretic Security, 69-86, 2015
192015
Automated assessment of secure search systems
M Varia, B Price, N Hwang, A Hamlin, J Herzog, J Poland, M Reschly, ...
ACM SIGOPS Operating Systems Review 49 (1), 22-30, 2015
192015
Two-server distributed ORAM with sublinear computation and constant rounds
A Hamlin, M Varia
IACR International Conference on Public-Key Cryptography, 499-527, 2021
182021
Don't even ask: Database access control through query control
R Shay, U Blumenthal, V Gadepally, A Hamlin, JD Mitchell, ...
ACM SIGMOD Record 47 (3), 17-22, 2019
182019
On the plausibility of fully homomorphic encryption for RAMs
A Hamlin, J Holmgren, M Weiss, D Wichs
Annual International Cryptology Conference, 589-619, 2019
132019
Proximity searchable encryption for the iris biometric
C Cachet, S Ahmad, L Demarest, A Hamlin, B Fuller
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
9*2022
Upgrading fuzzy extractors
C Cachet, A Hamlin, M Rezapour, B Fuller
International conference on applied cryptography and network security, 156-182, 2024
72024
Multi random projection inner product encryption, applications to proximity searchable encryption for the iris biometric
C Cachet, S Ahmad, L Demarest, S Riback, A Hamlin, B Fuller
Information and Computation 293, 105059, 2023
52023
Proximity searchable encryption for the iris biometric
S Ahmad, C Cachet, L Demarest, B Fuller, A Hamlin
Asia CCS, 2022
52022
Security and privacy assurance research (spar) pilot final report
B Fuller, D Mitchell, R Cunningham, U Blumenthal, P Cable, A Hamlin, ...
52015
A test-suite generator for database systems
A Hamlin, J Herzog
2014 IEEE High Performance Extreme Computing Conference (HPEC), 1-6, 2014
52014
Fully homomorphic encryption for rams
A Hamlin, J Holmgren, M Weiss, D Wichs
Cryptology ePrint Archive, 2019
22019
Applications of Doubly Efficient Private Information Retrieval
ATL Hamlin
Northeastern University, 2021
2021
PACE: Proactively Secure Accumulo with Cryptographic Enforcement
SI Ruoti, AT Hamlin, EH Shen, RK Cunningham
2017
Cryptography for Big Data Security........................ and Arkady Yerukhimovich
A Hamlin, N Schear, E Shen, M Varia, S Yakoubov
Big Data, 257-304, 2016
2016
Applications of Doubly Efficient PIR
A Hamlin
The system can't perform the operation now. Try again later.
Articles 1–20