Author of the publication

Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models.

, , , and . HotMobile, page 75-80. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Rubato: Noisy Ciphers for Approximate Homomorphic Encryption., , , , and . EUROCRYPT (1), volume 13275 of Lecture Notes in Computer Science, page 581-610. Springer, (2022)Mitigation on the AIM Cryptanalysis., , , and . IACR Cryptol. ePrint Arch., (2023)AIM: Symmetric Primitive for Shorter Signatures with Stronger Security., , , , , , , , , and 1 other author(s). IACR Cryptol. ePrint Arch., (2022)Rubato: Noisy Ciphers for Approximate Homomorphic Encryption (Full Version)., , , , and . IACR Cryptol. ePrint Arch., (2022)FRAST: TFHE-friendly Cipher Based on Random S-boxes., , , , , and . IACR Cryptol. ePrint Arch., (2024)Watching the Watchers: Practical Video Identification Attack in LTE Networks., , , , , , and . USENIX Security Symposium, page 1307-1324. USENIX Association, (2022)AIM: Symmetric Primitive for Shorter Signatures with Stronger Security., , , , , , , , , and 1 other author(s). CCS, page 401-415. ACM, (2023)Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models., , , and . HotMobile, page 75-80. ACM, (2019)LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper., , , , , , , and . WISEC, page 43-48. ACM, (2023)Preventing SIM Box Fraud Using Device Model Fingerprinting., , , , , , and . NDSS, The Internet Society, (2023)