User profiles for Christina Garman

Christina Garman

Purdue University
Verified email at purdue.edu
Cited by 5568

Zerocash: Decentralized anonymous payments from bitcoin

EB Sasson, A Chiesa, C Garman… - … IEEE symposium on …, 2014 - ieeexplore.ieee.org
Bit coin is the first digital currency to see widespread adoption. While payments are
conducted between pseudonyms, Bit coin cannot offer strong privacy guarantees: payment …

Zerocoin: Anonymous distributed e-cash from bitcoin

I Miers, C Garman, M Green… - 2013 IEEE symposium on …, 2013 - ieeexplore.ieee.org
Bitcoin is the first e-cash system to see widespread adoption. While Bitcoin offers the
potential for new types of financial interaction, it has significant limitations regarding privacy. …

Charm: a framework for rapidly prototyping cryptosystems

JA Akinyele, C Garman, I Miers, MW Pagano… - Journal of Cryptographic …, 2013 - Springer
We describe Charm, an extensible framework for rapidly prototyping cryptographic systems.
Charm provides a number of features that explicitly support the development of new …

Decentralized anonymous credentials

C Garman, M Green, I Miers - Cryptology ePrint Archive, 2013 - eprint.iacr.org
Anonymous credentials provide a powerful tool for making assertions about identity while
maintaining privacy. However, a limitation of today's anonymous credential systems is the …

Accountable privacy for decentralized anonymous payments

C Garman, M Green, I Miers - … FC 2016, Christ Church, Barbados, February …, 2017 - Springer
Decentralized ledger-based currencies such as Bitcoin provide a means to construct payment
systems without requiring a trusted bank. Removing this trust assumption comes at the …

zk-creds: Flexible anonymous credentials from zksnarks and existing identity infrastructure

M Rosenberg, J White, C Garman… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Frequently, users on the web need to show that they are, for example, not a robot, old enough
to access an age restricted video, or eligible to download an ebook from their local public …

A systematic analysis of the Juniper Dual EC incident

S Checkoway, J Maskiewicz, C Garman… - Proceedings of the …, 2016 - dl.acm.org
In December 2015, Juniper Networks announced multiple security vulnerabilities stemming
from unauthorized code in ScreenOS, the operating system for their NetScreen VPN routers. …

Micro-mobility vehicle dynamics and rider kinematics during electric scooter riding

CMR Garman, SG Como, IC Campbell, J Wishart… - 2020 - sae.org
Micro-mobility is a fast-growing trend in the trans-portation industry with stand-up electric
scooters (e-scooters) becoming increasingly popular in the United States. To date, up to 350 …

Dancing on the lip of the volcano: Chosen ciphertext attacks on apple {iMessage}

C Garman, M Green, G Kaptchuk, I Miers… - 25th USENIX Security …, 2016 - usenix.org
Apple’s iMessage is one of the most widely-deployed end-to-end encrypted messaging
protocols. Despite its broad deployment, the encryption protocols used by iMessage have never …

Attacks only get better: Password recovery attacks against {RC4} in {TLS}

C Garman, KG Paterson, T Van der Merwe - 24th USENIX Security …, 2015 - usenix.org
Despite recent high-profile attacks on the RC4 algorithm in TLS, its usage is still running at
about 30% of all TLS traffic. We provide new attacks against RC4 in TLS that are focussed on …