Seny Kamara
#135,968
Most Influential Person Now
American computer scientist
Seny Kamara's AcademicInfluence.com Rankings
Seny Kamaracomputer-science Degrees
Computer Science
#8591
World Rank
#9032
Historical Rank
Operating Systems
#20
World Rank
#21
Historical Rank
Algorithms
#464
World Rank
#470
Historical Rank
Database
#8416
World Rank
#8807
Historical Rank

Download Badge
Computer Science
Why Is Seny Kamara Influential?
(Suggest an Edit or Addition)According to Wikipedia, Seny Kamara is a Senegalese-French-American computer scientist best known for his work on cryptography. He has delivered multiple congressional testimonies about the potential harms and opportunities with technology. He leads or co-leads numerous centers and activities focused on cryptography and social good. His work has been covered extensively in high-profile media, including Wired and Forbes.
Seny Kamara's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Searchable symmetric encryption: improved definitions and efficient constructions (2006) (2388)
- Cryptographic Cloud Storage (2010) (1455)
- Dynamic searchable symmetric encryption (2012) (942)
- Parallel and Dynamic Searchable Symmetric Encryption (2013) (462)
- Inference Attacks on Property-Preserving Encrypted Databases (2015) (437)
- Structured Encryption and Controlled Disclosure (2010) (408)
- Proofs of Storage from Homomorphic Identification Protocols (2009) (391)
- Achieving Efficient Conjunctive Keyword Searches over Encrypted Data (2005) (364)
- Outsourcing Multi-Party Computation (2011) (168)
- Boolean Searchable Symmetric Encryption with Worst-Case Sub-linear Complexity (2017) (151)
- Scaling Private Set Intersection to Billion-Element Sets (2014) (130)
- Analysis of vulnerabilities in Internet firewalls (2003) (127)
- The Practical Subtleties of Biometric Key Generation (2008) (112)
- GRECS: Graph Encryption for Approximate Shortest Distance Queries (2015) (111)
- Salus: a system for server-aided secure function evaluation (2012) (96)
- Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage (2006) (86)
- SQL on Structurally-Encrypted Databases (2018) (82)
- CS2: A Searchable Cryptographic Cloud Storage System (2011) (79)
- Structured Encryption and Leakage Suppression (2018) (71)
- Towards practical biometric key generation with randomized biometric templates (2008) (69)
- Revisiting Leakage Abuse Attacks (2019) (57)
- Co-Location-Resistant Clouds (2014) (56)
- Computationally Volume-Hiding Structured Encryption (2019) (54)
- Tight bounds for online vector bin packing (2013) (54)
- Secure Outsourced Computation in a Multi-tenant Cloud (2011) (38)
- Forward and Backward Private Searchable Encryption with SGX (2019) (37)
- Breach-Resistant Structured Encryption (2018) (29)
- Inspection resistant memory: Architectural support for security from physical examination (2012) (24)
- How to Encrypt with a Malicious Random Number Generator (2008) (22)
- Encrypted Search (2015) (21)
- Encrypted Databases for Differential Privacy (2019) (20)
- Parallel Homomorphic Encryption (2013) (18)
- Restructuring the NSA Metadata Program (2014) (16)
- Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage (2015) (15)
- Towards Untrusted Social Video Verification to Combat Deepfakes via Face Geometry Consistency (2020) (15)
- Efficient Graph Encryption Scheme for Shortest Path Queries (2021) (12)
- ActiveSync, TCP/IP and 802.11b wireless vulnerabilities of WinCE-based PDAs (2002) (12)
- Outside Looking In: Approaches to Content Moderation in End-to-End Encrypted Systems (2022) (10)
- A Mechanism for Communication-Efficient Broadcast Encryption over Wireless Ad Hoc Networks (2007) (10)
- Structured Encryption and Dynamic Leakage Suppression (2021) (10)
- Proofs of Storage: Theory, Constructions and Applications (2013) (8)
- Garbled Circuits via Structured Encryption (2013) (8)
- An Optimal Relational Database Encryption Scheme (2020) (8)
- Encrypted Multi-Maps with Computationally-Secure Leakage (2018) (8)
- An extensible platform for evaluating security protocols (2005) (5)
- Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions ∗ (5)
- Proceedings of the 2012 ACM Workshop on Cloud computing security workshop (2012) (4)
- SoK: Cryptanalysis of Encrypted Search with LEAKER – A framework for LEakage AttacK Evaluation on Real-world data (2022) (4)
- Encrypted Blockchain Databases (2020) (4)
- Secret locking: Exploring new approaches to biometric key encapsulation (2005) (4)
- A Decentralized and Encrypted National Gun Registry (2021) (4)
- Attacking Data Center Networks from the Inside (2015) (3)
- CS 2 : A Searchable Cryptographic Cloud Storage System (2011) (2)
- Adversarial Level Agreements for Two-Party Protocols (2022) (2)
- Encrypted Distributed Hash Tables (2019) (2)
- Cryptanalysis of Encrypted Search with LEAKER - A framework for LEakage AttacK Evaluation on Real-world data (2021) (2)
- DogFish: Decentralized Optimistic Game-theoretic FIle SHaring (2018) (2)
- Encrypted Key-Value Stores (2020) (1)
- Penetration Analysis of Windows CE (2001) (0)
- Computing securely with untrusted resources (2008) (0)
- Algorithms for the People (2021) (0)
- Privacy Saving Multi-Keyword Ranking Search Anonymous ID on the Cloud Data that has been encrypted (2016) (0)
- 1 A Consumer Architecture (2010) (0)
- A Symposium: To Be Human: Surveillance, Recognition, Distortion (2020) (0)
- Markov Inference Attacks (2019) (0)
- 4th cloud computing security workshop (CCSW 2012) (2012) (0)
- Cs 2950-v (f'16) Lectures 2+3: Provable Security Contents (2016) (0)
- Lectures 4 + 5 : The ( In ) Security of Encrypted Search (2016) (0)
- Inspection-Resistant Memory Architectures (2013) (0)
- Cs 2950-v (f'16) Lecture 1: Overview Contents (2016) (0)
- Cs 2950-v (f'16) Lectures 6+7: Zero-leakage Solutions (2016) (0)
- Encrypted Distributed Systems (2022) (0)
This paper list is powered by the following services:
Other Resources About Seny Kamara
What Schools Are Affiliated With Seny Kamara?
Seny Kamara is affiliated with the following schools: