Author of the publication

How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior.

, , and . IACR Cryptology ePrint Archive, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure., , and . ACM Conference on Computer and Communications Security, page 1397-1414. ACM, (2018)The Retracing Boomerang Attack., , , and . EUROCRYPT (1), volume 12105 of Lecture Notes in Computer Science, page 280-309. Springer, (2020)IoT Goes Nuclear: Creating a Zigbee Chain Reaction., , , and . IEEE Secur. Priv., 16 (1): 54-62 (2018)TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation., , and . IACR Cryptol. ePrint Arch., (2022)That's not my signature! Fail-stop signatures for a post-quantum world., , , and . IACR Cryptol. ePrint Arch., (2023)The Retracing Boomerang Attack., , , and . IACR Cryptology ePrint Archive, (2019)The Gates of Time: Improving Cache Attacks with Transient Execution., , , , and . USENIX Security Symposium, page 1955-1972. USENIX Association, (2023)Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3., , , , and . EUROCRYPT (2), volume 12697 of Lecture Notes in Computer Science, page 127-154. Springer, (2021)Pseudorandom Black Swans: Cache Attacks on CTR_DRBG., , , , , , and . IACR Cryptol. ePrint Arch., (2019)IoT Goes Nuclear: Creating a ZigBee Chain Reaction., , , and . IACR Cryptology ePrint Archive, (2016)