Author of the publication

Lucky Microseconds: A Timing Attack on Amazon's s2n Implementation of TLS.

, and . IACR Cryptology ePrint Archive, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

What can identity-based cryptography offer to web services?, , and . SWS, page 26-36. ACM, (2007)On the Joint Security of Encryption and Signature, Revisited., , , and . ASIACRYPT, volume 7073 of Lecture Notes in Computer Science, page 161-178. Springer, (2011)Building Key-Private Public-Key Encryption Schemes., and . ACISP, volume 5594 of Lecture Notes in Computer Science, page 276-292. Springer, (2009)Efficient Identity-Based Signatures Secure in the Standard Model., and . ACISP, volume 4058 of Lecture Notes in Computer Science, page 207-222. Springer, (2006)RSA-Based Undeniable Signatures for General Moduli., , and . CT-RSA, volume 2271 of Lecture Notes in Computer Science, page 200-217. Springer, (2002)Padding Oracle Attacks on the ISO CBC Mode Encryption Standard., and . CT-RSA, volume 2964 of Lecture Notes in Computer Science, page 305-323. Springer, (2004)Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities., and . Pairing, volume 5209 of Lecture Notes in Computer Science, page 354-375. Springer, (2008)Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan., and . FSE, volume 3017 of Lecture Notes in Computer Science, page 446-453. Springer, (2004)Sequences for OFDM and Multi-Code CDMA: Two Problems in Algebraic Coding Theory.. SETA, page 46-71. Springer, (2001)Decoding Perfect Maps., and . Des. Codes Cryptogr., 4 (1): 11-30 (1994)