Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage., , , , and . USENIX Security Symposium, page 655-672. USENIX Association, (2016)HACCLE: metaprogramming for secure multi-party computation., , , , , , , , , and 10 other author(s). GPCE, page 130-143. ACM, (2021)Achieving Keyless CDNs with Conclaves., , and . USENIX Security Symposium, page 735-751. USENIX Association, (2020)Zerocoin: Anonymous Distributed E-Cash from Bitcoin., , , and . IEEE Symposium on Security and Privacy, page 397-411. IEEE Computer Society, (2013)Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS., , and . USENIX Security Symposium, page 113-128. USENIX Association, (2015)HACCLE: An Ecosystem for Building Secure Multi-Party Computations., , , , , , , , , and 9 other author(s). CoRR, (2020)Decentralized Anonymous Credentials., , and . NDSS, The Internet Society, (2014)ttzk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure., , , and . IACR Cryptol. ePrint Arch., (2022)Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity., , , and . Financial Cryptography Workshops, volume 8438 of Lecture Notes in Computer Science, page 140-155. Springer, (2014)Charm: a framework for rapidly prototyping cryptosystems., , , , , , and . J. Cryptographic Engineering, 3 (2): 111-128 (2013)