Author of the publication

Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption.

, , , , and . CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, page 222-250. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interactive network visualization in Jupyter notebooks: visJS2jupyter., , , , , and . Bioinform., 34 (1): 126-128 (2018)Partitioning Oracle Attacks., , and . USENIX Security Symposium, page 195-212. USENIX Association, (2021)Better Than Advertised: Improved Collision-Resistance Guarantees for MD-Based Hash Functions., , and . CCS, page 891-906. ACM, (2017)OPTIKS: An Optimized Key Transparency System., , , , and . IACR Cryptol. ePrint Arch., (2023)ELEKTRA: Efficient Lightweight multi-dEvice Key TRAnsparency., , , , , and . IACR Cryptol. ePrint Arch., (2024)Orca: Blocklisting in Sender-Anonymous Messaging., , , and . USENIX Security Symposium, page 2299-2316. USENIX Association, (2022)Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption., , , , and . CRYPTO (3), volume 11694 of Lecture Notes in Computer Science, page 222-250. Springer, (2019)Fuzzy Message Detection., , , and . CCS, page 1507-1528. ACM, (2021)Context Discovery and Commitment Attacks - How to Break CCM, EAX, SIV, and More., , , and . EUROCRYPT (4), volume 14007 of Lecture Notes in Computer Science, page 379-407. Springer, (2023)Interoperability in End-to-End Encrypted Messaging., , , and . IACR Cryptol. ePrint Arch., (2023)