Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hardware framework for the fast generation of multiple long-period random number streams., and . FPGA, page 245-254. ACM, (2008)MSWasm: Soundly Enforcing Memory-Safe Execution of Unsafe Code., , , , , , , , , and . CoRR, (2022)On Parallelizing the CryptMT Stream Cipher., , , and . VTC Spring, page 1082-1086. IEEE, (2008)WaVe: a verifiably secure WebAssembly sandboxing runtime., , , , , , , and . SP, page 2940-2955. IEEE, (2023)Constant-time foundations for the new spectre era., , , , , , and . PLDI, page 913-926. ACM, (2020)Information-Flow Control for Programming on Encrypted Data., , , and . CSF, page 45-60. IEEE Computer Society, (2012)STORM: Refinement Types for Secure Web Applications., , , , , , , and . OSDI, page 441-459. USENIX Association, (2021)User-Assisted Host-Based Detection of Outbound Malware Traffic., , , , and . ICICS, volume 5927 of Lecture Notes in Computer Science, page 293-307. Springer, (2009)Finding and Preventing Bugs in JavaScript Bindings., , , , , and . IEEE Symposium on Security and Privacy, page 559-578. IEEE Computer Society, (2017)Improved Linear Differential Attacks on CubeHash., , , and . AFRICACRYPT, volume 6055 of Lecture Notes in Computer Science, page 407-418. Springer, (2010)