From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Interactive network visualization in Jupyter notebooks: visJS2jupyter., , , , , и . Bioinform., 34 (1): 126-128 (2018)Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions., , и . CCS, стр. 891-906. ACM, (2017)Partitioning Oracle Attacks., , и . USENIX Security Symposium, стр. 195-212. USENIX Association, (2021)Orca: Blocklisting in Sender-Anonymous Messaging., , , и . USENIX Security Symposium, стр. 2299-2316. USENIX Association, (2022)ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency., , , , , и . IACR Cryptol. ePrint Arch., (2024)OPTIKS: An Optimized Key Transparency System., , , , и . IACR Cryptol. ePrint Arch., (2023)Fuzzy Message Detection., , , и . CCS, стр. 1507-1528. ACM, (2021)Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption., , , , и . CRYPTO (3), том 11694 из Lecture Notes in Computer Science, стр. 222-250. Springer, (2019)Context Discovery and Commitment Attacks - How to Break CCM, EAX, SIV, and More., , , и . EUROCRYPT (4), том 14007 из Lecture Notes in Computer Science, стр. 379-407. Springer, (2023)Partitioning Oracle Attacks., , и . IACR Cryptol. ePrint Arch., (2020)