scispace - formally typeset
S

Seny Kamara

Researcher at Brown University

Publications -  91
Citations -  10304

Seny Kamara is an academic researcher from Brown University. The author has contributed to research in topics: Encryption & Computer science. The author has an hindex of 32, co-authored 83 publications receiving 9005 citations. Previous affiliations of Seny Kamara include Purdue University & Microsoft.

Papers
More filters
Journal ArticleDOI

Inspection-Resistant Memory Architectures

TL;DR: The authors present an efficient scheme in which, even if an adversary is able to inspect the value of a stored bit with a probabilistic error of only 5 percent, the system will be able to prevent that adversary from learning any information about the original uncoded bits with 99.9999999999 percent probability.
Proceedings ArticleDOI

Encrypted Distributed Systems

Seny Kamara
TL;DR: It is shown how both cryptographic techniques and distributed systems need to be adapted to make this work and how to think about the security of these new encrypted distributed systems.
Journal Article

MAPLE: MArkov Process Leakage attacks on Encrypted Search

TL;DR: In this article , Oya and Kerschbaum presented two new leakage attacks, known-distribution or known-sample attacks, which can work either as known distribution or known sample attacks.
Patent

Searchable encryption of conjunctive sql statements

Seny Kamara, +1 more
TL;DR: In this article, a query controller receives, from a client device, a secure query in a format of an encrypted token generated using a structured query language (SQL) query in conjunctive query form, and sends an encrypted response to the secure query to the client device.
Journal Article

Injection-Secure Structured and Searchable Symmetric Encryption

TL;DR: Recently, Zhang et al. as discussed by the authors revisited the notion of forward privacy in several respects and showed that forward privacy does not necessarily guarantee security against adaptive injection attacks if a scheme reveals other leakage patterns like the query equality.