Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Algorithms for Reconstructing Databases and Cryptographic Secret Keys in Entropic Settings.. University of Maryland, College Park, MD, USA, (2022)base-search.net (ftunivmaryland:oai:drum.lib.umd.edu:1903/28740).Database Reconstruction from Noisy Volumes: A Cache Side-Channel Attack on SQLite., , and . USENIX Security Symposium, page 1019-1035. USENIX Association, (2021)Silent Simon: A threshold implementation under 100 slices., , and . HOST, page 1-6. IEEE Computer Society, (2015)Toward Practical Homomorphic Evaluation of Block Ciphers Using Prince., , , and . Financial Cryptography Workshops, volume 8438 of Lecture Notes in Computer Science, page 208-220. Springer, (2014)(In)Security of Ring-LWE Under Partial Key Exposure., , , and . J. Math. Cryptol., 15 (1): 72-86 (2021)Tight upper and lower bounds for leakage-resilient, locally decodable and updatable non-malleable codes., , and . Inf. Comput., (2019)On the Leakage Resilience of Ideal-Lattice Based Public Key Encryption., , , and . IACR Cryptology ePrint Archive, (2017)Lightweight Side Channel Resistance: Threshold Implementations of Simon., , and . IEEE Trans. Computers, 66 (4): 661-671 (2017)BKW Meets Fourier New Algorithms for LPN with Sparse Parities., , , and . TCC (2), volume 13043 of Lecture Notes in Computer Science, page 658-688. Springer, (2021)Transparency Tools for Fairness in AI (Luskin)., , , , , , , and . CoRR, (2020)