Christopher Patton
|
I am a PhD student in cryptography advised by Tom Shrimpton. I work for the Florida Institute for Cybersecurity Research (FICS) at the University of Florida. My work focuses on the limits of the provable security methodology as it pertains to real-world cryptosystems and protocols. I began my crypto education with Phil Rogaway at the University of California, Davis, where I earned my master's and bachelor's. I interned on the Crypto team at Cloudflare (SF) during the summer of 2018. I've done two internships at Google, the first on the Cloud Security team (KIR, 2015) and the second on the Chrome Protector team (MON, 2016). |
My CV includes contact information, details about my work experience, and professional references. I tweet a little bit (@cjpatton_) and I use GitHub. I'm also on LinkedIn.
Papers
- Probabilistic data structures in adversarial environments. D. Clayton, C. Patton, and T. Shrimpton. CCS 2019.
- Security in the presence of key reuse: Context-separable interfaces and their applications (ia.cr/2019/519). C. Patton, and T. Shrimpton. Crypto 2019.
- A hybrid approach to secure function evaluation using SGX. J. Choi, D. Tian, G. Hernandez, C. Patton, B. Mood, T. Shrimpton, K. Butler, and P. Traynor. AsiaCCS 2019.
- Digital healthcare-associated infection: A case study on the security of a major multi-campus hospital system. L. Vargas, L. Blue, V. Frost, C. Patton, N. Scaife, K. Butler, and P. Traynor. NDSS 2019.
- Partially specified channels: The TLS 1.3 record layer without elision (ia.cr/2018/634). C. Patton, and T. Shrimpton. CCS 2018.
- Hedging public-key encryption in the real world (ia.cr/2017/510). A. Boldyreva, C. Patton, and T. Shrimpton. Crypto 2017.
Code
I'm pretty good at Go, C, C++, and Python. I enjoy learning new languages (PL design was my first love in CS).- Delegated credentials for TLS (boringSSL server / NSS client). A protocol extension (draft-ietf-tls-subcerts) that allows a TLS operator to delegate credentials for terminating connections on its behalf.
- Roughtime (roughtime). A simple protocol for synchronizing clocks with enough accuracy for common cryptographic applications. I deployed the server on Cloudflare's infrastructure during my internship.
- Oblivious Go maps (store). A wacky idea for password management.
- Online AES-GCM (sgcm). Improvements to Go's implementation of AES-GCM.
- AEZ (aez). An implementation of the AEZv3 robust authenticated encryption scheme.