Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AIM: Symmetric Primitive for Shorter Signatures with Stronger Security., , , , , , , , , and 1 other author(s). IACR Cryptol. ePrint Arch., (2022)Mitigation on the AIM Cryptanalysis., , , and . IACR Cryptol. ePrint Arch., (2023)Rubato: Noisy Ciphers for Approximate Homomorphic Encryption (Full Version)., , , , and . IACR Cryptol. ePrint Arch., (2022)Rubato: Noisy Ciphers for Approximate Homomorphic Encryption., , , , and . EUROCRYPT (1), volume 13275 of Lecture Notes in Computer Science, page 581-610. Springer, (2022)Watching the Watchers: Practical Video Identification Attack in LTE Networks., , , , , , and . USENIX Security Symposium, page 1307-1324. USENIX Association, (2022)AIM: Symmetric Primitive for Shorter Signatures with Stronger Security., , , , , , , , , and 1 other author(s). CCS, page 401-415. ACM, (2023)Hidden Figures: Comparative Latency Analysis of Cellular Networks with Fine-grained State Machine Models., , , and . HotMobile, page 75-80. ACM, (2019)LTESniffer: An Open-source LTE Downlink/Uplink Eavesdropper., , , , , , , and . WISEC, page 43-48. ACM, (2023)Preventing SIM Box Fraud Using Device Model Fingerprinting., , , , , , and . NDSS, The Internet Society, (2023)Hiding in Plain Signal: Physical Signal Overshadowing Attack on LTE., , , , , and . USENIX Security Symposium, page 55-72. USENIX Association, (2019)