Search Results for author: Thomas Shrimpton

Found 3 papers, 1 papers with code

Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption

no code implementations13 Oct 2021 Luke A. Bauer, James K. Howes IV, Sam A. Markelon, Vincent Bindschaedler, Thomas Shrimpton

We introduce a new type of format-transforming encryption where the format of ciphertexts is implicitly encoded within a machine-learned generative model.

A Hybrid Approach to Secure Function Evaluation Using SGX

1 code implementation3 May 2019 Joseph I. Choi, Dave 'Jing' Tian, Grant Hernandez, Christopher Patton, Benjamin Mood, Thomas Shrimpton, Kevin R. B. Butler, Patrick Traynor

We describe SGX-enabled SFE protocols (modeling the enclave as an oracle), and formalize the strongest-possible notion of 2P-SFE for our setting.

Cryptography and Security

Network Traffic Obfuscation and Automated Internet Censorship

no code implementations13 May 2016 Lucas Dixon, Thomas Ristenpart, Thomas Shrimpton

In this survey, we give an overview of network traffic obfuscation and its role in circumventing Internet censorship.

Networking and Internet Architecture Cryptography and Security C.2

Cannot find the paper you are looking for? You can Submit a new open access paper.