Login / Signup
Benjamin Fuller
ORCID
Publication Activity (10 Years)
Years Active: 2012-2019
Publications (10 Years): 26
Top Topics
Public Key Cryptosystems
Iris Segmentation
Optimal Configuration
Convolutional Neural Networks
</>
Publications
</>
Devon Callahan
,
Timothy Curry
,
Daniel Davidson
,
Heytem Zitoun
,
Benjamin Fuller
,
Laurent Michel
FASHION: Functional and Attack graph Secured HybrId Optimization of virtualized Networks.
CoRR
(2019)
Timothy Curry
,
Devon Callahan
,
Benjamin Fuller
,
Laurent Michel
DOCSDN: Dynamic and Optimal Configuration of Software-Defined Networks.
CoRR
(2019)
Sailesh Simhadri
,
James Steel
,
Benjamin Fuller
Cryptographic Authentication from the Iris.
ISC
(2019)
Sohaib Ahmad
,
Benjamin Fuller
ThirdEye: Triplet Based Iris Recognition without Normalization.
CoRR
(2019)
Benjamin Fuller
,
Lowen Peng
Continuous-Source Fuzzy Extractors: Source uncertainty and insecurity.
ISIT
(2019)
Timothy Curry
,
Devon Callahan
,
Benjamin Fuller
,
Laurent Michel
DOCSDN: Dynamic and Optimal Configuration of Software-Defined Networks.
ACISP
(2019)
Sohaib Ahmad
,
Benjamin Fuller
Unconstrained Iris Segmentation using Convolutional Neural Networks.
CoRR
(2018)
Benjamin Fuller
,
Lowen Peng
When are Continuous-Source Fuzzy Extractors Possible?
IACR Cryptol. ePrint Arch.
2018 (2018)
Sohaib Ahmad
,
Benjamin Fuller
Unconstrained Iris Segmentation Using Convolutional Neural Networks.
ACCV Workshops
(2018)
Peter Fenteany
,
Benjamin Fuller
Non-malleable Digital Lockers.
IACR Cryptol. ePrint Arch.
2018 (2018)
Luke Demarest
,
Benjamin Fuller
,
Alexander Russell
Handling Correlated Errors: Hardness of LWE in the Exponent.
IACR Cryptol. ePrint Arch.
2018 (2018)
Quentin Alamélou
,
Paul-Edmond Berthier
,
Chloé Cachet
,
Stéphane Cauchie
,
Benjamin Fuller
,
Philippe Gaborit
,
Sailesh Simhadri
Pseudoentropic Isometries: A New Framework for Fuzzy Extractor Reusability.
AsiaCCS
(2018)
Charles Herder
,
Benjamin Fuller
,
Marten van Dijk
,
Srinivas Devadas
Public Key Cryptosystems with Noisy Secret Keys.
IACR Cryptol. ePrint Arch.
2017 (2017)
Benjamin Fuller
,
Mayank Varia
,
Arkady Yerukhimovich
,
Emily Shen
,
Ariel Hamlin
,
Vijay Gadepally
,
Richard Shay
,
John Darby Mitchell
,
Robert K. Cunningham
SoK: Cryptographically Protected Database Search.
IEEE Symposium on Security and Privacy
(2017)
Jeremy Blackthorne
,
Benjamin Kaiser
,
Benjamin Fuller
,
Bülent Yener
Environmental Authentication in Malware.
LATINCRYPT
(2017)
Sailesh Simhadri
,
James Steel
,
Benjamin Fuller
Reusable Authentication from the Iris.
IACR Cryptol. ePrint Arch.
2017 (2017)
Jeremy Blackthorne
,
Benjamin Kaiser
,
Benjamin Fuller
,
Bülent Yener
Environmental Authentication in Malware.
IACR Cryptol. ePrint Arch.
2017 (2017)
Chenglu Jin
,
Charles Herder
,
Ling Ren
,
Phuong Ha Nguyen
,
Benjamin Fuller
,
Srinivas Devadas
,
Marten van Dijk
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise.
Cryptogr.
1 (3) (2017)
Robert K. Cunningham
,
Benjamin Fuller
,
Sophia Yakoubov
Catching MPC Cheaters: Identification and Openability.
ICITS
(2017)
Benjamin Fuller
,
Mayank Varia
,
Arkady Yerukhimovich
,
Emily Shen
,
Ariel Hamlin
,
Vijay Gadepally
,
Richard Shay
,
John Darby Mitchell
,
Robert K. Cunningham
SoK: Cryptographically Protected Database Search.
CoRR
(2017)
Ran Canetti
,
Benjamin Fuller
,
Omer Paneth
,
Leonid Reyzin
,
Adam D. Smith
Reusable Fuzzy Extractors for Low-Entropy Distributions.
EUROCRYPT (1)
(2016)
Robert K. Cunningham
,
Benjamin Fuller
,
Sophia Yakoubov
Catching MPC Cheaters: Identification and Openability.
IACR Cryptol. ePrint Arch.
2016 (2016)
Benjamin Fuller
,
Leonid Reyzin
,
Adam D. Smith
When Are Fuzzy Extractors Possible?
ASIACRYPT (1)
(2016)
Benjamin Fuller
,
Ariel Hamlin
Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy.
ICITS
(2015)
Benjamin Fuller
,
Adam O'Neill
,
Leonid Reyzin
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy.
J. Cryptol.
28 (3) (2015)
Benjamin Fuller
,
Ariel Hamlin
Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy.
IACR Cryptol. ePrint Arch.
2015 (2015)
Ran Canetti
,
Benjamin Fuller
,
Omer Paneth
,
Leonid Reyzin
Key Derivation From Noisy Sources With More Errors Than Entropy.
IACR Cryptol. ePrint Arch.
2014 (2014)
Benjamin Fuller
,
Adam D. Smith
,
Leonid Reyzin
Where are Fuzzy Extractors Possible?
IACR Cryptol. ePrint Arch.
2014 (2014)
Benjamin Fuller
,
Xianrui Meng
,
Leonid Reyzin
Computational Fuzzy Extractors.
IACR Cryptol. ePrint Arch.
2013 (2013)
Benjamin Fuller
,
Xianrui Meng
,
Leonid Reyzin
Computational Fuzzy Extractors.
ASIACRYPT (1)
(2013)
Benjamin Fuller
,
Adam O'Neill
,
Leonid Reyzin
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy.
TCC
(2012)
Benjamin Fuller
,
Adam O'Neill
,
Leonid Reyzin
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy.
IACR Cryptol. ePrint Arch.
2012 (2012)
Benjamin Fuller
,
Leonid Reyzin
Computational Entropy and Information Leakage.
IACR Cryptol. ePrint Arch.
2012 (2012)