Author of the publication

Strong and Efficient Cache Side-Channel Protection using Hardware Transactional Memory.

, , , , , and . USENIX Security Symposium, page 217-233. USENIX Association, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Oblivious Permutation via the Waksman Network., , and . AsiaCCS, page 771-783. ACM, (2022)An Algorithmic Framework For Differentially Private Data Analysis on Trusted Processors., , , , , and . NeurIPS, page 13635-13646. (2019)Data-Oblivious Algorithms for Privacy-Preserving Access to Cloud Storage.. Brown University, USA, (2014)Authenticating Email Search Results., , and . STM, volume 7783 of Lecture Notes in Computer Science, page 225-240. Springer, (2012)Randomize the Future: Asymptotically Optimal Locally Private Frequency Estimation Protocol for Longitudinal Data., , and . PODS, page 237-249. ACM, (2022)Propagation = Lazy Clause Generation., , and . CP, volume 4741 of Lecture Notes in Computer Science, page 544-558. Springer, (2007)Contamination Attacks and Mitigation in Multi-Party Machine Learning., and . NeurIPS, page 6604-6616. (2018)Verifiable Zero-Knowledge Order Queries and Updates for Fully Dynamic Lists and Trees., , , and . SCN, volume 9841 of Lecture Notes in Computer Science, page 216-236. Springer, (2016)Leakage of Dataset Properties in Multi-Party Machine Learning., , and . USENIX Security Symposium, page 2687-2704. USENIX Association, (2021)Analyzing Information Leakage of Updates to Natural Language Models., , , , , , , and . CCS, page 363-375. ACM, (2020)