Author of the publication

The ghost is the machine: Weird machines in transient execution.

, , and . SP (Workshops), page 264-272. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bounded Verification for Finite-Field-Blasting - In a Compiler for Zero Knowledge Proofs., , , and . CAV (3), volume 13966 of Lecture Notes in Computer Science, page 154-175. Springer, (2023)Linear-time zero-knowledge SNARKs for R1CS., , , and . IACR Cryptol. ePrint Arch., (2021)Specialized Proof of Confidential Knowledge (SPoCK)., and . IACR Cryptol. ePrint Arch., (2023)Finding and Preventing Bugs in JavaScript Bindings., , , , , and . IEEE Symposium on Security and Privacy, page 559-578. IEEE Computer Society, (2017)Brakedown: Linear-time and post-quantum SNARKs for R1CS., , , , and . IACR Cryptol. ePrint Arch., (2021)Unifying Compilers for SNARKs, SMT, and More., , and . IACR Cryptol. ePrint Arch., (2020)Compact Certificates of Collective Knowledge., , , , and . IACR Cryptol. ePrint Arch., (2020)Silph: A Framework for Scalable and Accurate Generation of Hybrid MPC Protocols., , , , , and . SP, page 848-863. IEEE, (2023)CirC: Compiler infrastructure for proof systems, software verification, and more., , and . SP, page 2248-2266. IEEE, (2022)Unlocking the Lookup Singularity with Lasso., , and . EUROCRYPT (6), volume 14656 of Lecture Notes in Computer Science, page 180-209. Springer, (2024)