Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Scantegrity: End-to-End Voter-Verifiable Optical-Scan Voting., , , , , , and . IEEE Secur. Priv., 6 (3): 40-46 (2008)*Socrates 2.0 Beats Grandmaster Sagalchik., and . J. Int. Comput. Games Assoc., 18 (2): 124 (1995)Catching the Cuckoo: Verifying TPM Proximity Using a Quote Timing Side-Channel - (Short Paper)., , , and . TRUST, volume 6740 of Lecture Notes in Computer Science, page 294-301. Springer, (2011)Is DES a Pure Cipher? (Results of More Cycling Experiments on DES)., , and . CRYPTO, volume 218 of Lecture Notes in Computer Science, page 212-226. Springer, (1985)Statistical Techniques for Language Recognition: an Empirical Study Using Real and Simulated English., and . Cryptologia, 18 (4): 289-331 (1994)How we Solved the $100, 000 Decipher Puzzle (16 Hours too late)., and . Cryptologia, 14 (3): 258-284 (1990)BVOT: Self-Tallying Boardroom Voting with Oblivious Transfer., and . IACR Cryptol. ePrint Arch., (2020)Cybersecurity: Exploring core concepts through six scenarios., , , , , , , and . Cryptologia, 42 (4): 337-377 (2018)How to Break Gifford's Cipher., and . Cryptologia, 21 (3): 237-286 (1997)UDM: Private user discovery with minimal information disclosure., , , and . Cryptologia, 46 (4): 347-379 (2022)