S
Seny Kamara
Researcher at Brown University
Publications - 91
Citations - 10304
Seny Kamara is an academic researcher from Brown University. The author has contributed to research in topics: Encryption & Computer science. The author has an hindex of 32, co-authored 83 publications receiving 9005 citations. Previous affiliations of Seny Kamara include Purdue University & Microsoft.
Papers
More filters
Journal ArticleDOI
Inspection-Resistant Memory Architectures
Jonathan Valamehr,Melissa Chase,Seny Kamara,Andrew Putnam,Daniel Shumow,Vinod Vaikuntanathan,Timothy Sherwood +6 more
TL;DR: The authors present an efficient scheme in which, even if an adversary is able to inspect the value of a stored bit with a probabilistic error of only 5 percent, the system will be able to prevent that adversary from learning any information about the original uncoded bits with 99.9999999999 percent probability.
Proceedings ArticleDOI
Encrypted Distributed Systems
TL;DR: It is shown how both cryptographic techniques and distributed systems need to be adapted to make this work and how to think about the security of these new encrypted distributed systems.
Journal Article
MAPLE: MArkov Process Leakage attacks on Encrypted Search
TL;DR: In this article , Oya and Kerschbaum presented two new leakage attacks, known-distribution or known-sample attacks, which can work either as known distribution or known sample attacks.
Patent
Searchable encryption of conjunctive sql statements
Seny Kamara,Tarik Moataz +1 more
TL;DR: In this article, a query controller receives, from a client device, a secure query in a format of an encrypted token generated using a structured query language (SQL) query in conjunctive query form, and sends an encrypted response to the secure query to the client device.
Journal Article
Injection-Secure Structured and Searchable Symmetric Encryption
TL;DR: Recently, Zhang et al. as discussed by the authors revisited the notion of forward privacy in several respects and showed that forward privacy does not necessarily guarantee security against adaptive injection attacks if a scheme reveals other leakage patterns like the query equality.