Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling., and . CT-RSA, volume 11405 of Lecture Notes in Computer Science, page 330-349. Springer, (2019)PESrank: An Explainable online password strength estimator., and . J. Comput. Secur., 30 (6): 877-901 (2022)Explicit Rateless Codes for Memoryless Binary-Input Output-Symmetric Channels., , and . Theory of Computing, 14 (1): 1-29 (2018)An Explainable Online Password Strength Estimator., and . ESORICS (1), volume 12972 of Lecture Notes in Computer Science, page 285-304. Springer, (2021)Are Your Keys Protected? Time Will Tell., , , and . ITC, volume 304 of LIPIcs, page 3:1-3:28. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2024)Context Aware Password Guessability via Multi-Dimensional Rank Estimation., and . CoRR, (2019)Deterministic Rateless Codes for BSC., , and . CoRR, (2014)Deterministic Rateless Codes for BSC., , and . ITCS, page 31-40. ACM, (2015)Rank estimation with bounded error via exponential sampling., and . J. Cryptogr. Eng., 12 (2): 151-168 (2022)Scaling up GAEN Pseudorandom Processes: Preparing for a More Extensive Pandemic., , , and . ESORICS (1), volume 13554 of Lecture Notes in Computer Science, page 237-255. Springer, (2022)