Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure., , and . ACM Conference on Computer and Communications Security, page 1397-1414. ACM, (2018)The Retracing Boomerang Attack., , , and . IACR Cryptology ePrint Archive, (2019)The Retracing Boomerang Attack., , , and . EUROCRYPT (1), volume 12105 of Lecture Notes in Computer Science, page 280-309. Springer, (2020)TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation., , and . IACR Cryptol. ePrint Arch., (2022)That's not my signature! Fail-stop signatures for a post-quantum world., , , and . IACR Cryptol. ePrint Arch., (2023)IoT Goes Nuclear: Creating a Zigbee Chain Reaction., , , and . IEEE Secur. Priv., 16 (1): 54-62 (2018)The Gates of Time: Improving Cache Attacks with Transient Execution., , , , and . USENIX Security Symposium, page 1955-1972. USENIX Association, (2023)Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3., , , , and . EUROCRYPT (2), volume 12697 of Lecture Notes in Computer Science, page 127-154. Springer, (2021)IoT Goes Nuclear: Creating a ZigBee Chain Reaction., , , and . IACR Cryptology ePrint Archive, (2016)The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations., , , , , and . IEEE Symposium on Security and Privacy, page 435-452. IEEE, (2019)