Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Explicit Rateless Codes for Memoryless Binary-Input Output-Symmetric Channels., , and . Theory of Computing, 14 (1): 1-29 (2018)PESrank: An Explainable online password strength estimator., and . J. Comput. Secur., 30 (6): 877-901 (2022)An Explainable Online Password Strength Estimator., and . ESORICS (1), volume 12972 of Lecture Notes in Computer Science, page 285-304. Springer, (2021)Rank Estimation with Bounded Error via Exponential Sampling., and . IACR Cryptol. ePrint Arch., (2021)Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling., and . CT-RSA, volume 11405 of Lecture Notes in Computer Science, page 330-349. Springer, (2019)BGP Typo: A Longitudinal Study and Remedies., and . CoRR, (2023)PRank: Fast Analytical Rank Estimation via Pareto Distributions., and . IACR Cryptology ePrint Archive, (2018)A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional Side-Channel Attacks., and . IACR Cryptology ePrint Archive, (2015)Rank estimation with bounded error via exponential sampling., and . J. Cryptogr. Eng., 12 (2): 151-168 (2022)Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic., , , and . ESORICS (1), volume 13554 of Lecture Notes in Computer Science, page 237-255. Springer, (2022)