Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography., and . NDSS, The Internet Society, (2010)LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes., , , , and . USENIX Security Symposium, page 877-891. USENIX Association, (2014)To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC., , , and . CRYPTO, volume 7417 of Lecture Notes in Computer Science, page 348-366. Springer, (2012)Formatted Encryption Beyond Regular Languages., , , and . ACM Conference on Computer and Communications Security, page 1292-1303. ACM, (2014)Seeing through Network-Protocol Obfuscation., , , , and . ACM Conference on Computer and Communications Security, page 57-69. ACM, (2015)When Textbook RSA is Used to Protect the Privacy of Hundreds of Millions of Users., , and . CoRR, (2018)The Tao of Inference in Privacy-Protected Databases., , , , and . PVLDB, 11 (11): 1715-1728 (2018)A Formal Treatment of Backdoored Pseudorandom Generators., , , , and . IACR Cryptology ePrint Archive, (2016)To Hash or Not to Hash Again? (In)differentiability Results for H2 and HMAC., , , and . IACR Cryptology ePrint Archive, (2013)Hedged Public-key Encryption: How to Protect against Bad Randomness., , , , , , and . IACR Cryptology ePrint Archive, (2012)