Author of the publication

Computational Soundness of Non-Malleable Commitments.

, , and . ISPEC, volume 4991 of Lecture Notes in Computer Science, page 361-376. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Spinner: Semi-Automatic Detection of Pinning without Hostname Verification., , and . ACSAC, page 176-188. ACM, (2017)Why Banker Bob (Still) Can't Get TLS Right: A Security Analysis of TLS in Leading UK Banking Apps., , , and . Financial Cryptography, volume 10322 of Lecture Notes in Computer Science, page 579-597. Springer, (2017)Beneath the Bonnet: A Breakdown of Diagnostic Security., and . ESORICS (1), volume 11098 of Lecture Notes in Computer Science, page 305-324. Springer, (2018)Fill your Boots: Enhanced Embedded Bootloader Exploits via Fault Injection and Binary Analysis., , , and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021 (1): 56-81 (2021)Grey-box Analysis and Fuzzing of Automotive Electronic Components via Control-Flow Graph Extraction., and . CSCS, page 9:1-9:11. ACM, (2020)MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware., , and . CCS, page 515-529. ACM, (2022)LeiA: A Lightweight Authentication Protocol for CAN., and . ESORICS (2), volume 9879 of Lecture Notes in Computer Science, page 283-300. Springer, (2016)A Tale of Two Worlds: Assessing the Vulnerability of Enclave Shielding Runtimes., , , , , and . CCS, page 1741-1758. ACM, (2019)Privacy-Friendly Energy-Metering via Homomorphic Encryption., and . STM, volume 6710 of Lecture Notes in Computer Science, page 226-238. Springer, (2010)Spam Filter Analysis., , and . SEC, volume 147 of IFIP, page 395-410. Kluwer / Springer, (2004)