Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fully automated analysis of padding-based encryption in the computational model., , , , , , and . ACM Conference on Computer and Communications Security, page 1247-1260. ACM, (2013)Automation in Computer-Aided Cryptography: Proofs, Attacks and Designs., , , , and . CPP, volume 7679 of Lecture Notes in Computer Science, page 7-8. Springer, (2012)Formally Certifying the Security of Digital Signature Schemes., , , and . SP, page 237-250. IEEE Computer Society, (2009)Computer-Aided Cryptographic Proofs., , and . SAS, volume 7460 of Lecture Notes in Computer Science, page 1-2. Springer, (2012)Downgrade Resilience in Key-Exchange Protocols., , , , , and . IEEE Symposium on Security and Privacy, page 506-525. IEEE Computer Society, (2016)Dataset and Lessons Learned from the 2024 SaTML LLM Capture-the-Flag Competition., , , , , , , , , and 11 other author(s). CoRR, (2024)Bayesian Estimation of Differential Privacy., , , , , , , , and . ICML, volume 202 of Proceedings of Machine Learning Research, page 40624-40636. PMLR, (2023)EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider., , , , , , , , , and 5 other author(s). IACR Cryptol. ePrint Arch., (2019)Imperfect forward secrecy: how Diffie-Hellman fails in practice., , , , , , , , , and 4 other author(s). Commun. ACM, 62 (1): 106-114 (2019)Smart meter aggregation via secret-sharing., , , and . SEGS@CCS, page 75-80. ACM, (2013)