Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interactive network visualization in Jupyter notebooks: visJS2jupyter., , , , , and . Bioinform., 34 (1): 126-128 (2018)Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions., , and . CCS, page 891-906. ACM, (2017)Partitioning Oracle Attacks., , and . USENIX Security Symposium, page 195-212. USENIX Association, (2021)Orca: Blocklisting in Sender-Anonymous Messaging., , , and . USENIX Security Symposium, page 2299-2316. USENIX Association, (2022)ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency., , , , , and . IACR Cryptol. ePrint Arch., (2024)OPTIKS: An Optimized Key Transparency System., , , , and . IACR Cryptol. ePrint Arch., (2023)Fuzzy Message Detection., , , and . CCS, page 1507-1528. ACM, (2021)Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption., , , , and . CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, page 222-250. Springer, (2019)Context Discovery and Commitment Attacks - How to Break CCM, EAX, SIV, and More., , , and . EUROCRYPT (4), volume 14007 of Lecture Notes in Computer Science, page 379-407. Springer, (2023)Partitioning Oracle Attacks., , and . IACR Cryptol. ePrint Arch., (2020)