Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lest we remember: cold-boot attacks on encryption keys., , , , , , , , and . Commun. ACM, 52 (5): 91-98 (2009)The Proof is in the Pudding: Proofs of Work for Solving Discrete Logarithms., , and . IACR Cryptology ePrint Archive, (2018)CacheBleed: a timing attack on OpenSSL constant-time RSA., , and . J. Cryptographic Engineering, 7 (2): 99-112 (2017)Factoring as a Service., , , , , and . IACR Cryptology ePrint Archive, (2015)CopyCat: Controlled Instruction-Level Attacks on Enclaves for Maximal Key Extraction., , , , and . CoRR, (2020)Ideal forms of Coppersmith's theorem and Guruswami-Sudan list decoding., and . ICS, page 298-308. Tsinghua University Press, (2011)Elliptic Curve Cryptography in Practice., , , , , and . Financial Cryptography, volume 8437 of Lecture Notes in Computer Science, page 157-175. Springer, (2014)Torchestra: reducing interactive traffic delays over tor., and . WPES, page 31-42. ACM, (2012)CopyCat: Controlled Instruction-Level Attacks on Enclaves., , , , and . USENIX Security Symposium, page 469-486. USENIX Association, (2020)Computational Complexity and Information Asymmetry in Election Audits with Low-Entropy Randomness.. EVT/WOTE, USENIX Association, (2010)