Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptoleq: A Heterogeneous Abstract Machine for Encrypted and Unencrypted Computation., , and . IACR Cryptology ePrint Archive, (2015)Practical Data-in-Use Protection Using Binary Decision Diagrams., , , , and . IEEE Access, (2020)Accelerated Encrypted Execution of General-Purpose Applications., , , , , and . IACR Cryptol. ePrint Arch., (2023)Masquerade: Verifiable Multi-Party Aggregation with Secure Multiplicative Commitments., and . IACR Cryptol. ePrint Arch., (2021)Enabling multi-layer cyber-security assessment of Industrial Control Systems through Hardware-In-The-Loop testbeds., , , , and . ASP-DAC, page 511-518. IEEE, (2016)Trust No One: Thwarting "heartbleed" Attacks Using Privacy-Preserving Computation., and . ISVLSI, page 59-64. IEEE Computer Society, (2014)$MP\ellC$: Privacy-Preserving IP Verification Using Logic Locking and Secure Multiparty Computation., , and . IOLTS, page 1-8. IEEE, (2023)E3: A Framework for Compiling C++ Programs with Encrypted Operands., , , and . IACR Cryptology ePrint Archive, (2018)Smart PV Inverter Cyberattack Detection Using Hardware-in-the-Loop Test Facility., , , , , and . IEEE Access, (2023)Obfuscated arbitrary computation using cryptographic primitives., and . IDT, page 5-8. IEEE, (2015)