default search action
Benjamin Fuller 0001
Person information
- affiliation: University of Connecticut, Storrs, CT, USA
- affiliation (PhD 2015): Boston University, MA, USA
- affiliation (2007 - 2016): Massachusetts Institute of Technology, Lincoln Laboratory, Boston, MA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Benjamin Fuller:
Impossibility of efficient information-theoretic fuzzy extraction. Des. Codes Cryptogr. 92(7): 1983-2009 (2024) - [c30]Chloé Cachet, Ariel Hamlin, Maryam Rezapour, Benjamin Fuller:
Upgrading Fuzzy Extractors. ACNS (1) 2024: 156-182 - [c29]Mahdieh Heidaripour, Ladan Kian, Maryam Rezapour, Mark Holcomb, Benjamin Fuller, Gagan Agrawal, Hoda Maleki:
Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption. SECRYPT 2024: 459-466 - [c28]Benjamin Fuller, Rashmi Pai, Alexander Russell:
The Decisive Power of Indecision: Low-Variance Risk-Limiting Audits and Election Contestation via Marginal Mark Recording. USENIX Security Symposium 2024 - [i30]Benjamin Fuller, Rashmi Pai, Alexander Russell:
The Decisive Power of Indecision: Low-Variance Risk-Limiting Audits and Election Contestation via Marginal Mark Recording. CoRR abs/2402.06515 (2024) - [i29]Luke Demarest, Sohaib Ahmad, Sixia Chen, Benjamin Fuller, Alexander Russell:
FiveEyes: Cryptographic Biometric Authentication from the Iris. IACR Cryptol. ePrint Arch. 2024: 100 (2024) - [i28]Mahdieh Heidaripour, Ladan Kian, Maryam Rezapour, Mark Holcomb, Benjamin Fuller, Gagan Agrawal, Hoda Maleki:
Organizing Records for Retrieval in Multi-Dimensional Range Searchable Encryption. IACR Cryptol. ePrint Arch. 2024: 635 (2024) - [i27]Maryam Rezapour, Benjamin Fuller:
ProxCode: Efficient Biometric Proximity Searchable Encryption from Error Correcting Codes. IACR Cryptol. ePrint Arch. 2024: 999 (2024) - 2023
- [j8]Chloé Cachet, Sohaib Ahmad, Luke Demarest, Serena Riback, Ariel Hamlin, Benjamin Fuller:
Multi random projection inner product encryption, applications to proximity searchable encryption for the iris biometric. Inf. Comput. 293: 105059 (2023) - [j7]Devon Callahan, Timothy Curry, Hazel Davidson, Heytem Zitoun, Benjamin Fuller, Laurent Michel:
FASHION: Functional and Attack Graph Secured HybrId Optimization of Virtualized Networks. IEEE Trans. Dependable Secur. Comput. 20(4): 3093-3109 (2023) - [c27]Benjamin Fuller, Abigail Harrison, Alexander Russell:
Adaptive Risk-Limiting Comparison Audits. SP 2023: 3314-3331 - [i26]Luke Demarest, Benjamin Fuller, Alexander Russell:
Impossibility of Efficient Information-Theoretic Fuzzy Extraction. IACR Cryptol. ePrint Arch. 2023: 172 (2023) - [i25]Julie Ha, Chloé Cachet, Luke Demarest, Sohaib Ahmad, Benjamin Fuller:
Private Eyes: Zero-Leakage Iris Searchable Encryption. IACR Cryptol. ePrint Arch. 2023: 736 (2023) - [i24]Chloé Cachet, Ariel Hamlin, Maryam Rezapour, Benjamin Fuller:
Upgrading Fuzzy Extractors. IACR Cryptol. ePrint Arch. 2023: 1941 (2023) - 2022
- [c26]Chloé Cachet, Sohaib Ahmad, Luke Demarest, Ariel Hamlin, Benjamin Fuller:
Proximity Searchable Encryption for the Iris Biometric. AsiaCCS 2022: 1004-1018 - [c25]Daniel Apon, Chloé Cachet, Benjamin Fuller, Peter Hall, Feng-Hao Liu:
Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model. ASIACRYPT (4) 2022: 353-383 - [c24]Timothy Curry, Gabriel De Pace, Benjamin Fuller, Laurent Michel, Yan Lindsay Sun:
DUELMIPs: Optimizing SDN Functionality and Security. CP 2022: 17:1-17:18 - [c23]Sohaib Ahmad, Kaleel Mahmood, Benjamin Fuller:
Inverting Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models. IJCB 2022: 1-11 - [i23]Abigail Harrison, Benjamin Fuller, Alexander Russell:
Lazy Risk-Limiting Ballot Comparison Audits. CoRR abs/2202.02607 (2022) - [i22]Sohaib Ahmad, Benjamin Fuller, Kaleel Mahmood:
Privacy Attacks Against Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models. CoRR abs/2209.11020 (2022) - [i21]Daniel Apon, Chloé Cachet, Benjamin Fuller, Peter Hall, Feng-Hao Liu:
Nonmalleable Digital Lockers and Robust Fuzzy Extractors in the Plain Model. IACR Cryptol. ePrint Arch. 2022: 1108 (2022) - 2021
- [j6]Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin, Adam D. Smith:
Reusable Fuzzy Extractors for Low-Entropy Distributions. J. Cryptol. 34(1): 2 (2021) - [c22]Luke Demarest, Benjamin Fuller, Alexander Russell:
Code Offset in the Exponent. ITC 2021: 15:1-15:23 - 2020
- [j5]Benjamin Fuller, Xianrui Meng, Leonid Reyzin:
Computational fuzzy extractors. Inf. Comput. 275: 104602 (2020) - [j4]Benjamin Fuller, Leonid Reyzin, Adam D. Smith:
When Are Fuzzy Extractors Possible? IEEE Trans. Inf. Theory 66(8): 5282-5298 (2020) - [c21]Peter Fenteany, Benjamin Fuller:
Same Point Composable and Nonmalleable Obfuscated Point Functions. ACNS (2) 2020: 124-144 - [c20]Sohaib Ahmad, Benjamin Fuller:
Resist: Reconstruction of irises from templates. IJCB 2020: 1-10 - [i20]Sohaib Ahmad, Benjamin Fuller:
Resist : Reconstruction of irises from templates. CoRR abs/2007.15850 (2020) - [i19]Chloé Cachet, Luke Demarest, Benjamin Fuller, Ariel Hamlin:
Proximity Searchable Encryption for Biometrics. IACR Cryptol. ePrint Arch. 2020: 1174 (2020)
2010 – 2019
- 2019
- [c19]Timothy Curry, Devon Callahan, Benjamin Fuller, Laurent Michel:
DOCSDN: Dynamic and Optimal Configuration of Software-Defined Networks. ACISP 2019: 456-474 - [c18]Sohaib Ahmad, Benjamin W. Fuller:
ThirdEye: Triplet Based Iris Recognition without Normalization. BTAS 2019: 1-9 - [c17]Benjamin Fuller, Lowen Peng:
Continuous-Source Fuzzy Extractors: Source uncertainty and insecurity. ISIT 2019: 2952-2956 - [c16]Sailesh Simhadri, James Steel, Benjamin Fuller:
Cryptographic Authentication from the Iris. ISC 2019: 465-485 - [i18]Timothy Curry, Devon Callahan, Benjamin Fuller, Laurent Michel:
DOCSDN: Dynamic and Optimal Configuration of Software-Defined Networks. CoRR abs/1902.05988 (2019) - [i17]Sohaib Ahmad, Benjamin Fuller:
ThirdEye: Triplet Based Iris Recognition without Normalization. CoRR abs/1907.06147 (2019) - [i16]Devon Callahan, Timothy Curry, Daniel Davidson, Heytem Zitoun, Benjamin Fuller, Laurent Michel:
FASHION: Functional and Attack graph Secured HybrId Optimization of virtualized Networks. CoRR abs/1910.07921 (2019) - 2018
- [c15]Sohaib Ahmad, Benjamin Fuller:
Unconstrained Iris Segmentation Using Convolutional Neural Networks. ACCV Workshops 2018: 450-466 - [c14]Quentin Alamélou, Paul-Edmond Berthier, Chloé Cachet, Stéphane Cauchie, Benjamin Fuller, Philippe Gaborit, Sailesh Simhadri:
Pseudoentropic Isometries: A New Framework for Fuzzy Extractor Reusability. AsiaCCS 2018: 673-684 - [i15]Sohaib Ahmad, Benjamin Fuller:
Unconstrained Iris Segmentation using Convolutional Neural Networks. CoRR abs/1812.08245 (2018) - [i14]Benjamin Fuller, Lowen Peng:
When are Continuous-Source Fuzzy Extractors Possible? IACR Cryptol. ePrint Arch. 2018: 461 (2018) - [i13]Peter Fenteany, Benjamin Fuller:
Non-malleable Digital Lockers. IACR Cryptol. ePrint Arch. 2018: 957 (2018) - [i12]Luke Demarest, Benjamin Fuller, Alexander Russell:
Handling Correlated Errors: Hardness of LWE in the Exponent. IACR Cryptol. ePrint Arch. 2018: 1005 (2018) - 2017
- [j3]Chenglu Jin, Charles Herder, Ling Ren, Phuong Ha Nguyen, Benjamin Fuller, Srinivas Devadas, Marten van Dijk:
FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise. Cryptogr. 1(3): 23 (2017) - [c13]Robert K. Cunningham, Benjamin Fuller, Sophia Yakoubov:
Catching MPC Cheaters: Identification and Openability. ICITS 2017: 110-134 - [c12]Jeremy Blackthorne, Benjamin Kaiser, Benjamin Fuller, Bülent Yener:
Environmental Authentication in Malware. LATINCRYPT 2017: 381-400 - [c11]Benjamin Fuller, Mayank Varia, Arkady Yerukhimovich, Emily Shen, Ariel Hamlin, Vijay Gadepally, Richard Shay, John Darby Mitchell, Robert K. Cunningham:
SoK: Cryptographically Protected Database Search. IEEE Symposium on Security and Privacy 2017: 172-191 - [i11]Benjamin Fuller, Mayank Varia, Arkady Yerukhimovich, Emily Shen, Ariel Hamlin, Vijay Gadepally, Richard Shay, John Darby Mitchell, Robert K. Cunningham:
SoK: Cryptographically Protected Database Search. CoRR abs/1703.02014 (2017) - [i10]Charles Herder, Benjamin Fuller, Marten van Dijk, Srinivas Devadas:
Public Key Cryptosystems with Noisy Secret Keys. IACR Cryptol. ePrint Arch. 2017: 210 (2017) - [i9]Jeremy Blackthorne, Benjamin Kaiser, Benjamin Fuller, Bülent Yener:
Environmental Authentication in Malware. IACR Cryptol. ePrint Arch. 2017: 928 (2017) - [i8]Sailesh Simhadri, James Steel, Benjamin Fuller:
Reusable Authentication from the Iris. IACR Cryptol. ePrint Arch. 2017: 1177 (2017) - 2016
- [c10]Benjamin Fuller, Leonid Reyzin, Adam D. Smith:
When Are Fuzzy Extractors Possible? ASIACRYPT (1) 2016: 277-306 - [c9]Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin, Adam D. Smith:
Reusable Fuzzy Extractors for Low-Entropy Distributions. EUROCRYPT (1) 2016: 117-146 - [i7]Robert K. Cunningham, Benjamin Fuller, Sophia Yakoubov:
Catching MPC Cheaters: Identification and Openability. IACR Cryptol. ePrint Arch. 2016: 611 (2016) - 2015
- [b1]Benjamin W. Fuller:
Strong key derivation from noisy sources. Boston University, USA, 2015 - [j2]Benjamin Fuller, Adam O'Neill, Leonid Reyzin:
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy. J. Cryptol. 28(3): 671-717 (2015) - [j1]Gene Itkis, Venkat Chandar, Benjamin W. Fuller, Joseph P. Campbell, Robert K. Cunningham:
Iris Biometric Security Challenges and Possible Solutions: For your eyes only?Using the iris as a key. IEEE Signal Process. Mag. 32(5): 42-53 (2015) - [c8]Benjamin Fuller, Ariel Hamlin:
Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy. ICITS 2015: 69-86 - [i6]Benjamin Fuller, Ariel Hamlin:
Unifying Leakage Classes: Simulatable Leakage and Pseudoentropy. IACR Cryptol. ePrint Arch. 2015: 857 (2015) - 2014
- [c7]Merrielle Spain, Benjamin Fuller, Kyle Ingols, Robert K. Cunningham:
Robust keys from physical unclonable functions. HOST 2014: 88-92 - [i5]Ran Canetti, Benjamin Fuller, Omer Paneth, Leonid Reyzin:
Key Derivation From Noisy Sources With More Errors Than Entropy. IACR Cryptol. ePrint Arch. 2014: 243 (2014) - [i4]Benjamin Fuller, Adam D. Smith, Leonid Reyzin:
Where are Fuzzy Extractors Possible? IACR Cryptol. ePrint Arch. 2014: 961 (2014) - 2013
- [c6]Benjamin Fuller, Xianrui Meng, Leonid Reyzin:
Computational Fuzzy Extractors. ASIACRYPT (1) 2013: 174-193 - [i3]Benjamin Fuller, Xianrui Meng, Leonid Reyzin:
Computational Fuzzy Extractors. IACR Cryptol. ePrint Arch. 2013: 416 (2013) - 2012
- [c5]Galen E. Pickard, Roger I. Khazan, Benjamin W. Fuller, Joseph A. Cooley:
DSKE: Dynamic Set Key Encryption. LCN Workshops 2012: 1006-1013 - [c4]Benjamin Fuller, Adam O'Neill, Leonid Reyzin:
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy. TCC 2012: 582-599 - [i2]Benjamin Fuller, Adam O'Neill, Leonid Reyzin:
A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy. IACR Cryptol. ePrint Arch. 2012: 5 (2012) - [i1]Benjamin Fuller, Leonid Reyzin:
Computational Entropy and Information Leakage. IACR Cryptol. ePrint Arch. 2012: 466 (2012) - 2010
- [c3]Joseph A. Cooley, Roger I. Khazan, Benjamin W. Fuller, Galen E. Pickard:
GROK: A Practical System for Securing Group Communications. NCA 2010: 100-107 - [c2]Benjamin W. Fuller, Roger I. Khazan, Joseph A. Cooley, Galen E. Pickard, Daniil M. Utin:
ASE: Authenticated Statement Exchange. NCA 2010: 155-161
2000 – 2009
- 2007
- [c1]T. H. Yu, Benjamin W. Fuller, J. H. Bannick, Lee M. Rossey, Robert K. Cunningham:
Integrated Environment Management for Information Operations Testbeds. VizSEC 2007: 67-83
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint