Research Papers
Reports
- 
U.S. House of Representatives Financial Services Committee: the Role of Big Data in Financial Services 
 Seny Kamara
 (testimony, video)
- 
National Academies Report: Decrypting the Encryption Debate. 
 F. Cate (Chair), D. Boneh, F. Chang, S. Charney, S. Goldwasser, D. Hoffman, S. Kamara, D. Kris, S. Landau, S. Lipner, R. Littlehale, K. Martin, H. Rishikof, P. Weinberger.
 (report, overview@Lawfare)
- 
Future Directions in Computing on Encrypted Data 
 Nigel Smart (ed), D. Archer, D. Bogdanov, A. Boldyreva, S. Kamara, F. Kerschbaum, Y. Lindell, S. Lu, J. B. Nie lsen, R. Ostrovsky, J. Pagter, A.-R. Sadeghi, A. Waller.
 European Union ECRYPT Project.
 (report)
Conference Papers
- 
Outside Looking In: Approaches to Content Moderation in End-to-End Encrypted Systems 
 Seny Kamara, Mallory Knodel, Emma Llansó, Greg Nojeim, Lucy Qin, Dhanaraj Thakur, Caitlin Vogus
 Report for Center for Democracy and Technology ‘21
 (report pdf)
- 
Cryptanalysis of Encrypted Search with LEAKER: A framework for LEakage AttacK Evaluation on Real-world data 
 Seny Kamara, Abdelkarim Kati, Tarik Moataz, Thomas Schneider, Amos Treiber, Michael Yonli
 IACR ePrint
 (full pdf)
- 
Structured Encryption and Dynamic Leakage Suppression 
 Marilyn George, Seny Kamara, Tarik Moataz
 Eurocrypt ‘21
 (proceedings pdf)
- 
A Decentralized and Encrypted National Gun Registry 
 Seny Kamara, Tarik Moataz, Andrew Park, Lucy Qin
 IEEE Symposium on Security and Privacy (Oakland) ‘21
 (full pdf)
- 
Encrypted Databases: From Theory to Practice 
 Zheguang Zhao, Seny Kamara, Tarik Moataz, Stan Zdonik
 Conference on Innovative Data Systems Research (CIDR) ‘21
 (proceedings pdf)
- 
Adversarial Level Agreements for Two-Party Protocols 
 Marilyn George, Seny Kamara
 IACR ePrint
 (full pdf)
- 
Encrypted Key Value Stores 
 Archita Agarwal, Seny Kamara
 Indocrypt ‘20
 (proceedings pdf)
- 
Encrypted Blockchain Databases 
 Daniel Adkins, Archita Agarwal, Seny Kamara, Tarik Moataz
 Advances in Financial Technologies ‘20
 (full pdf, blog)
- 
Towards Untrusted Social Video Verification to Combat Deepfakes via Face Geometry Consistency 
 Eleanor Tursman, Marilyn George, Seny Kamara, James Tompkin
 Media Forensics CVPR Workshop ‘20
 (proceedings pdf, Eleanor’s Talk)
- 
An Optimal Relational Database Encryption Scheme 
 Seny Kamara, Tarik Moataz, Stan Zdonik, Zheguang Zhao
 IACR ePrint
 (full pdf)
- 
Encrypted Distributed Hash Tables 
 Archita Agarwal, Seny Kamara
 IACR ePrint
 (full pdf, blog, Archita’s talk)
- 
Revisiting Leakage-Abuse Attacks 
 Laura Blackstone, Seny Kamara, Tarik Moataz
 NDSS ‘20
 (full pdf)
- 
Computationally Volume-Hiding Structured Encryption 
 Seny Kamara, Tarik Moataz
 Eurocrypt ‘19
 (full pdf)
- 
Forward and Backward Private Searchable Encryption with SGX 
 Ghous Amjad, Seny Kamara, Tarik Moataz
 Eurosec ‘19
 (proceedings pdf)
- 
Encrypted Databases for Differential Privacy 
 Archita Agarwal, Maurice Herlihy, Seny Kamara, Tarik Moataz
 PETS ‘19
 (full pdf)
- 
Breach-Resistant Structured Encryption 
 Ghous Amjad, Seny Kamara, Tarik Moataz
 PETS ‘19
 (full pdf)
- 
SQL on Structurally-Encrypted Databases 
 Seny Kamara, Tarik Moataz
 Asiacrypt ‘18
 (full pdf)
 3rd most influential paper in cryptography from 2018
- 
Structured Encryption and Leakage Suppression 
 Seny Kamara, Tarik Moataz, Olya Ohrimenko
 CRYPTO ‘18
 (proceedings pdf)
- 
Boolean Searchable Symmetric Encryption with Worst-Case Sub-Linear Complexity 
 Seny Kamara, Tarik Moataz
 Eurocrypt ‘17
 (proceedings pdf)
- 
Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage 
 G. Ateniese, A. Faonio, S. Kamara
 IMA International Conference on Cryptography and Coding (IMACC ‘15)
- 
Inference Attacks Against Property-Preserving Encrypted Databases 
 Muhammad Naveed, Seny Kamara, Charles Wright
 Conference on Computer and Communications Security (CCS ‘15)
 Invited to Real-World Crypto, 2016
 (proceedings pdf)
 10th most influential paper in information security from 2015
- 
GRECS: Graph Encryption for Approximate Shortest Distance Queries 
 Xianrui Meng, Seny Kamara, Kobbi Nissim, George Kollios
 Conference on Computer and Communications Security (CCS ‘15)
 (full version pdf)
- 
Co-Location-Resistant Clouds 
 Y. Azar, S. Kamara, I. Menache, M. Raykova and B. Shepherd
 ACM Cloud Computing Security Workshop (CCSW ‘14)
 (full version pdf)
- 
Encrypted Search 
 Seny Kamara
 ACM XRDS
 (tech report pdf)
- 
Restructuring the NSA Metadata Program 
 Seny Kamara
 Workshop on Applied Homomorphic Cryptography (WAHC ‘14)
 (proceedings pdf)
- 
Scaling Private Set Intersection to Billion Element Sets 
 Seny Kamara, Payman Mohassel, Mariana Raykova and Saeed Sadeghian
 Financial Cryptography and Data Security (FC'14)
 (proceedings pdf)
- 
Tight Bounds for Online Vector Bin Packing 
 Y. Azar, I. Cohen, S. Kamara and B. Shepherd
 ACM Symposium on the Theory of Computing (STOC ‘13)
- 
Garbled Circuits via Structured Encryption 
 Seny Kamara and Lei Wei
 Workshop on Applied Homomorphic Cryptography (WAHC ‘13)
 (proceedings pdf)
- 
Parallel Homomorphic Encryption (or MapReduce/Hadoop on Encrypted Data) 
 Seny Kamara and Mariana Raykova
 Workshop on Applied Homomorphic Cryptography (WAHC ‘13)
 (proceedings pdf; full pdf)
- 
Parallel and Dynamic Searchable Symmetric Encryption 
 Seny Kamara and Charalampos Papamanthou
 Financial Cryptography and Data Security (FC ‘13)
 (full pdf)
- 
Salus: A System for Server-Aided Secure Function Evaluation 
 Seny Kamara, Payman Mohassel and Ben Riva
 Conference on Computer and Communications Security (CCS ‘12)
 (full pdf)
- 
Dynamic Searchable Symmetric Encryption 
 Seny Kamara, Charalampos Papamanthou and Tom Roeder
 Conference on Computer and Communications Security (CCS ‘12)
 (full pdf)
 7th most influential paper in information security from 2012
- 
Secure Outsourced Computation in a Multi-Tenant Cloud 
 S. Kamara and M. Raykova
 Workshop on Cryptography and Security in Clouds, 2011
 (proceedings pdf)
- 
Cryptographic Cloud Storage 
 Seny Kamara and Kristin Lauter
 Workshop on Real-Life Cryptographic Protocols and Standardization, 2010
 (proceedings pdf)
- 
An Inspection-Resistant On-Chip Memory Architecture 
 M. Chase, S. Kamara, A. Putnam, T. Sherwood, D. Shumow and V. Vaikuntanathan International Symposium on Computer Architecture (ISCA ‘12)
 IEEE Micro Top Picks in Computer Architecture 2013
- 
Trustworthy from Silicon Up 
 M. Chase, S. Kamara, A. Putnam, T. Sherwood, D. Shumow and V. Vaikuntanathan
 New Directions in Computer Architecture, 2011
- 
Structured Encryption and Controlled Disclosure 
 Melissa Chase and Seny Kamara
 Advances in Cryptology - ASIACRYPT ‘10
 (full pdf)
- 
Proofs of Storage from Homomorphic Identification Protocols 
 G. Ateniese, S. Kamara, J. Katz
 ASIACRYPT ‘09
- 
Towards Practical Biometric Key Generation with Randomized Biometric Templates 
 L. Ballard, S. Kamara, F. Monrose, M. Reiter
 ACM Conference on Computer and Communications Security (CCS ‘08)
- 
The Practical Subtleties of Biometric Key Generation 
 L. Ballard, S. Kamara, F. Monrose, M. Reiter
 USENIX Security Symposium (Usenix ‘08)
- 
How to Encrypt with a Malicious Random Number Generator 
 S. Kamara, J. Katz
 Workshop on Fast Software Encryption (FSE ‘08)
- 
Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions 
 Reza Curtmola, Juan Garay, Seny Kamara and Rafail Ostrovsky.
 Conference on Computer and Communications Security (CCS ‘06)
 Journal of Computer Security
 (full pdf)
 21st most influential paper in information security since 1981
 2nd most influential paper in information security from 2006
- 
A Mechanism for Communication-Efficient Broadcast Encryption Over Wireless Ad-Hoc Networks 
 R. Curtmola, S. Kamara
 Workshop on Cryptography in Ad Hoc Networks (WCAN ‘06)
- 
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage 
 K. Fu, S. Kamara, T. Kohno
 Network and Distributed System Security Symposium (NDSS ‘06)
- 
Achieving Secure Conjunctive Searches over Encrypted Data 
 L. Ballard, S. Kamara, F. Monrose
 International Conference on Information and Communicationis Security (ICICS ‘05)
- 
Secret Locking: A New Approach to Biometric Key Encapsulation 
 S. Kamara, B. de Medeiros, S. Wetzel
 International Conference on E-business and Telecommunication Networks (ICETE 2005)
- 
An Extensible Platform for Evaluating Security Protocols 
 S. Kamara, D. Davis, L. Ballard, R. Caudy, F. Monrose
 Annual IEEE Simulation Symposium (IEEE ANSS ‘05)
- 
ActiveSync, TCP/IP and 802.11 Wireless Vulnerabilities of WinCE-based PDAs P. Meunier, S. Nystrom, S. Kamara, S. Yost, K. Alexander, D. Noland, J. Crane. 
 IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 02)