Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Computer-Aided Proofs for Multiparty Computation with Active Security., , , , and . CSF, page 119-131. IEEE Computer Society, (2018)A Program Logic for Union Bounds., , , , and . ICALP, volume 55 of LIPIcs, page 107:1-107:15. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, (2016)A messy state of the union: taming the composite state machines of TLS., , , , , , , and . Commun. ACM, 60 (2): 99-107 (2017)Machine-Checked Proofs of Privacy for Electronic Voting Protocols., , , , , and . IEEE Symposium on Security and Privacy, page 993-1008. IEEE Computer Society, (2017)A Messy State of the Union: Taming the Composite State Machines of TLS., , , , , , , and . IEEE Symposium on Security and Privacy, page 535-552. IEEE Computer Society, (2015)Higher-Order Approximate Relational Refinement Types for Mechanism Design and Differential Privacy., , , , , and . POPL, page 55-68. ACM, (2015)Formal proofs of transcendence for e and pi as an application of multivariate and symmetric polynomials., , , and . CPP, page 76-87. ACM, (2016)Strong Non-Interference and Type-Directed Higher-Order Masking., , , , , , and . ACM Conference on Computer and Communications Security, page 116-129. ACM, (2016)Certified Synthesis of Efficient Batch Verifiers., , , , and . CSF, page 153-165. IEEE Computer Society, (2014)Triple Handshakes and Cookie Cutters: Breaking and Fixing Authentication over TLS., , , , and . IEEE Symposium on Security and Privacy, page 98-113. IEEE Computer Society, (2014)