Author of the publication

A Systematic Analysis of the Juniper Dual EC Incident.

, , , , , , , , , and . ACM Conference on Computer and Communications Security, page 468-479. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Achieving Keyless CDNs with Conclaves., , and . USENIX Security Symposium, page 735-751. USENIX Association, (2020)Zerocoin: Anonymous Distributed E-Cash from Bitcoin., , , and . IEEE Symposium on Security and Privacy, page 397-411. IEEE Computer Society, (2013)Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS., , and . USENIX Security Symposium, page 113-128. USENIX Association, (2015)Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity., , , and . Financial Cryptography Workshops, volume 8438 of Lecture Notes in Computer Science, page 140-155. Springer, (2014)Decentralized Anonymous Credentials., , and . NDSS, The Internet Society, (2014)Dancing on the Lip of the Volcano: Chosen Ciphertext Attacks on Apple iMessage., , , , and . USENIX Security Symposium, page 655-672. USENIX Association, (2016)HACCLE: metaprogramming for secure multi-party computation., , , , , , , , , and 10 other author(s). GPCE, page 130-143. ACM, (2021)Bento: Bringing Network Function Virtualization to Tor., , , , , and . ACM Conference on Computer and Communications Security, page 2109-2111. ACM, (2020)Bento: safely bringing network function virtualization to Tor., , , , , , and . SIGCOMM, page 821-835. ACM, (2021)Pathfinder: High-Resolution Control-Flow Attacks Exploiting the Conditional Branch Predictor., , , , , , , , , and . ASPLOS (3), page 770-784. ACM, (2024)