Sotabase
Home
Researchers
Career
·
Senior Staff Software Engineer
,
Google
2023–
·
PhD Student
,
Columbia University
2019–2022
·
Senior Software Engineer
,
Google
2019–2021
·
Bachelors of Mathematics (Computer Science and Combinatorics & Optimization)
,
University of Waterloo
2011–2016
Publications
(39)
Protecting accounts from credential stuffing with password breach alerting
USENIX Security Symposium · 2019
149
cited
Mitigating Leakage in Secure Cloud-Hosted Data Structures: Volume-Hiding for Multi-Maps via Hashing
Conference on Computer and Communications Security · 2019
137
cited
Communication-Computation Trade-offs in PIR
IACR Cryptology ePrint Archive · 2019
116
cited
PanORAMa: Oblivious RAM with Logarithmic Overhead
IEEE Annual Symposium on Foundations of Computer Science · 2018
94
cited
Private Stateful Information Retrieval
Conference on Computer and Communications Security · 2018
74
cited
Near-Optimal Oblivious Key-Value Stores for Efficient PSI, PSU and Volume-Hiding Multi-Maps
IACR Cryptology ePrint Archive · 2023
68
cited
Dynamic Volume-Hiding Encrypted Multi-Maps with Applications to Searchable Encryption
IACR Cryptology ePrint Archive · 2023
48
cited
Don't be Dense: Efficient Keyword PIR for Sparse Databases
IACR Cryptology ePrint Archive · 2023
34
cited
Lower Bounds for Differentially Private RAMs
Electron. Colloquium Comput. Complex. · 2019
30
cited
Symmetric Searchable Encryption with Sharing and Unsharing
IACR Cryptology ePrint Archive · 2018
30
cited
Cuckoo Hashing in Cryptography: Optimal Parameters, Robustness and Applications
IACR Cryptology ePrint Archive · 2023
23
cited
Efficient Boolean Search over Encrypted Data with Reduced Leakage
IACR Cryptology ePrint Archive · 2021
21
cited
Lower Bounds for Oblivious Near-Neighbor Search
IACR Cryptology ePrint Archive · 2019
21
cited
Lower Bounds for (Batch) PIR with Private Preprocessing
IACR Cryptology ePrint Archive · 2022
20
cited
Lower Bounds for Multi-Server Oblivious RAMs
IACR Cryptology ePrint Archive · 2019
20
cited
Lower Bounds for Encrypted Multi-Maps and Searchable Encryption in the Leakage Cell Probe Model
Annual International Cryptology Conference · 2020
18
cited
Limits of Preprocessing for Single-Server PIR
IACR Cryptology ePrint Archive · 2022
16
cited
What Storage Access Privacy is Achievable with Small Overhead?
IACR Cryptology ePrint Archive · 2019
16
cited
RSA Blind Signatures with Public Metadata
IACR Cryptology ePrint Archive · 2025
15
cited
CacheShuffle: A Family of Oblivious Shuffles
International Colloquium on Automata, Languages and Programming · 2018
14
cited
Show all 39 papers →
Sotabase
Kevin Yeo | Researcher Profile | Sotabase | Sotabase