Author of the publication

Environmental Authentication in Malware.

, , , and . LATINCRYPT, volume 11368 of Lecture Notes in Computer Science, page 381-400. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

FPGA Implementation of a Cryptographically-Secure PUF Based on Learning Parity with Noise., , , , , , and . Cryptography, 1 (3): 23 (2017)Reusable Authentication from the Iris., , and . IACR Cryptology ePrint Archive, (2017)Key Derivation From Noisy Sources With More Errors Than Entropy., , , and . IACR Cryptology ePrint Archive, (2014)Catching MPC Cheaters: Identification and Openability., , and . ICITS, volume 10681 of Lecture Notes in Computer Science, page 110-134. Springer, (2017)Environmental Authentication in Malware., , , and . LATINCRYPT, volume 11368 of Lecture Notes in Computer Science, page 381-400. Springer, (2017)Pseudoentropic Isometries: A New Framework for Fuzzy Extractor Reusability., , , , , , and . AsiaCCS, page 673-684. ACM, (2018)Handling Correlated Errors: Hardness of LWE in the Exponent., , and . IACR Cryptology ePrint Archive, (2018)Where are Fuzzy Extractors Possible?, , and . IACR Cryptology ePrint Archive, (2014)A Unified Approach to Deterministic Encryption: New Constructions and a Connection to Computational Entropy., , and . TCC, volume 7194 of Lecture Notes in Computer Science, page 582-599. Springer, (2012)When Are Fuzzy Extractors Possible?, , and . ASIACRYPT (1), volume 10031 of Lecture Notes in Computer Science, page 277-306. (2016)