Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices., , , and . USENIX Security Symposium, page 205-220. USENIX Association, (2012)Ideal forms of Coppersmith's theorem and Guruswami-Sudan list decoding, and . CoRR, (2010)Imperfect forward secrecy: how Diffie-Hellman fails in practice., , , , , , , , , and 4 other author(s). Commun. ACM, 62 (1): 106-114 (2019)CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks., , , , , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018 (2): 171-191 (2018)Ideal forms of Coppersmith's theorem and Guruswami-Sudan list decoding., and . Adv. in Math. of Comm., 9 (3): 311-339 (2015)Weak Keys Remain Widespread in Network Devices., , and . Internet Measurement Conference, page 49-63. ACM, (2016)Computational Complexity and Information Asymmetry in Election Audits with Low-Entropy Randomness.. EVT/WOTE, USENIX Association, (2010)Lest we remember: cold-boot attacks on encryption keys., , , , , , , , and . Commun. ACM, 52 (5): 91-98 (2009)Factoring as a Service., , , , , and . IACR Cryptology ePrint Archive, (2015)The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms., , and . IACR Cryptology ePrint Archive, (2018)