Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analyzing Privacy Loss in Updates of Natural Language Models., , , , and . CoRR, (2019)EverCrypt: A Fast, Verified, Cross-Platform Cryptographic Provider., , , , , , , , , and 6 other author(s). SP, page 983-1002. IEEE, (2020)Grey-box Extraction of Natural Language Models., , , and . ICML, volume 139 of Proceedings of Machine Learning Research, page 12278-12286. PMLR, (2021)A Formal Specification of the MIDP 2.0 Security Model., , and . Formal Aspects in Security and Trust, volume 4691 of Lecture Notes in Computer Science, page 220-234. Springer, (2006)Formal certification of code-based cryptographic proofs., , and . POPL, page 90-101. ACM, (2009)Probabilistic relational reasoning for differential privacy., , , and . POPL, page 97-110. ACM, (2012)Beyond Provable Security Verifiable IND-CCA Security of OAEP., , , and . CT-RSA, volume 6558 of Lecture Notes in Computer Science, page 180-196. Springer, (2011)Verifiable Security of Boneh-Franklin Identity-Based Encryption., , and . ProvSec, volume 6980 of Lecture Notes in Computer Science, page 68-83. Springer, (2011)Computer-Aided Cryptographic Proofs., , and . SAS, volume 7460 of Lecture Notes in Computer Science, page 1-2. Springer, (2012)Automation in Computer-Aided Cryptography: Proofs, Attacks and Designs., , , , and . CPP, volume 7679 of Lecture Notes in Computer Science, page 7-8. Springer, (2012)