Author of the publication

In search of CurveSwap: Measuring elliptic curve implementations in the wild.

, , , and . IACR Cryptology ePrint Archive, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy Pass: Bypassing Internet Challenges Anonymously., , , , and . PoPETs, 2018 (3): 164-180 (2018)Loop Detection in Content Delivery Networks (CDNs)., , and . RFC, (April 2019)nQUIC: Noise-Based QUIC Packet Protection., , , and . IACR Cryptology ePrint Archive, (2019)nQUIC: Noise-Based QUIC Packet Protection., , , and . EPIQ@CoNEXT, page 22-28. ACM, (2018)403 Forbidden: A Global View of CDN Geoblocking., , , , , , , and . IMC, page 218-230. ACM, (2018)An Analysis of TLS Handshake Proxying., and . TrustCom/BigDataSE/ISPA (1), page 279-286. IEEE, (2015)Sequential single-item auction improvements for heterogeneous multi-robot routing., , and . Robotics and Autonomous Systems, (2019)A Dual Genetic Algorithm for Multi-Robot Routing with Network Connectivity and Energy Efficiency., , and . ICARCV, page 1647-1652. IEEE, (2018)In search of CurveSwap: Measuring elliptic curve implementations in the wild., , , and . IACR Cryptology ePrint Archive, (2018)Protocols for Checking Compromised Credentials., , , , , and . CCS, page 1387-1403. ACM, (2019)