Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Efficient Randomness Testing using Boolean Functions., , and . SECRYPT, page 92-103. SciTePress, (2017)Large-scale Randomness Study of Security Margins for 100+ Cryptographic Functions., , , , and . SECRYPT, page 134-146. SCITEPRESS, (2022)Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans., , , , and . ACSAC, page 162-175. ACM, (2017)Privacy-Friendly Monero Transaction Signing on a Hardware Wallet., and . SEC, volume 580 of IFIP Advances in Information and Communication Technology, page 338-351. Springer, (2020)Traversing symmetric NAT with predictable port allocation., and . SIN, page 543. ACM, (2014)I Want to Break Square-free: The 4p - 1 Factorization Method and Its RSA Backdoor Viability., , , , and . ICETE (2), page 25-36. SciTePress, (2019)A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components., , , , , and . CCS, page 1583-1600. ACM, (2017)BoolTest: The Fast Randomness Testing Strategy Based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256., , , and . ICETE (Selected Papers), volume 990 of Communications in Computer and Information Science, page 123-149. Springer, (2017)The Return of Coppersmith's Attack: Practical Factorization of Widely Used RSA Moduli., , , , and . CCS, page 1631-1648. ACM, (2017)