Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A practical testing framework for isolating hardware timing channels., , , and . DATE, page 1281-1284. EDA Consortium San Jose, CA, USA / ACM DL, (2013)Contour: A Practical System for Binary Transparency., and . CoRR, (2017)Top Ten Obstacles along Distributed Ledgers Path to Adoption.. IEEE Security & Privacy, 16 (4): 13-19 (2018)Verifiable Elections That Scale for Free., , , and . IACR Cryptology ePrint Archive, (2012)Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings., , , and . IACR Cryptology ePrint Archive, (2019)Privacy-Enhancing Overlays in Bitcoin., and . Financial Cryptography Workshops, volume 8976 of Lecture Notes in Computer Science, page 127-141. Springer, (2015)Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions., , and . ASIACRYPT (2), volume 10032 of Lecture Notes in Computer Science, page 655-681. (2016)A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups., and . Public Key Cryptography, volume 9020 of Lecture Notes in Computer Science, page 377-398. Springer, (2015)Tracing Transactions Across Cryptocurrency Ledgers., , and . USENIX Security Symposium, page 837-850. USENIX Association, (2019)Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers., , , , and . NDSS, The Internet Society, (2019)