Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TERMinator Suite: Benchmarking Privacy-Preserving Architectures., , and . IACR Cryptology ePrint Archive, (2017)zk -Sherlock: Exposing Hardware Trojans in Zero-Knowledge., , and . ISVLSI, page 170-175. IEEE, (2022)HELM: Navigating Homomorphic Encryption through Gates and Lookup Tables., , and . IACR Cryptol. ePrint Arch., (2023)Covert Data Exfiltration Using Light and Power Channels., , , , and . ICCD, page 301-304. IEEE, (2019)MPloC: Privacy-Preserving IP Verification using Logic Locking and Secure Multiparty Computation., , and . IACR Cryptol. ePrint Arch., (2023)$MP\ellC$: Privacy-Preserving IP Verification Using Logic Locking and Secure Multiparty Computation., , and . IOLTS, page 1-8. IEEE, (2023)NFTs for 3D Models: Sustaining Ownership in Industry 4.0., and . IEEE Consumer Electron. Mag., 13 (5): 13-22 (September 2024)Juliet: A Configurable Processor for Computing on Encrypted Data., , and . IEEE Trans. Computers, 73 (9): 2335-2349 (September 2024)PLASMA: Private, Lightweight Aggregated Statistics against Malicious Adversaries with Full Security., , and . IACR Cryptol. ePrint Arch., (2023)SoK: New Insights into Fully Homomorphic Encryption Libraries via Standardized Benchmarks., , and . Proc. Priv. Enhancing Technol., 2023 (3): 154-172 (July 2023)