Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Bucket ORAM: Single Online Roundtrip, Constant Bandwidth Oblivious RAM., , , , and . IACR Cryptology ePrint Archive, (2015)Bridging the GPGPU-FPGA efficiency gap., , , , and . FPGA, page 119-122. ACM, (2011)Accelerating Sparse Data Orchestration via Dynamic Reflexive Tiling (Extended Abstract)., , , , , , , , , and 1 other author(s). HOPC@SPAA, page 15-16. ACM, (2023)SynthCT: Towards Portable Constant-Time Code., , and . NDSS, The Internet Society, (2022)Double-Cross Attacks: Subverting Active Learning Systems., , and . USENIX Security Symposium, page 1593-1610. USENIX Association, (2021)Lord of the Ring(s): Side Channel Attacks on the CPU On-Chip Ring Interconnect Are Practical., , and . USENIX Security Symposium, page 645-662. USENIX Association, (2021)HOP: Hardware makes Obfuscation Practical., , , , , , and . NDSS, The Internet Society, (2017)Graphite: optimizing graph neural networks on CPUs through cooperative software-hardware techniques., , , , , and . ISCA, page 916-931. ACM, (2022)SecDir: a secure directory to defeat directory side-channel attacks., , , and . ISCA, page 332-345. ACM, (2019)Untangle: A Principled Framework to Design Low-Leakage, High-Performance Dynamic Partitioning Schemes., , , and . ASPLOS (3), page 771-788. ACM, (2023)