From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks., , , и . IEEE Symposium on Security and Privacy, стр. 1067-1083. IEEE, (2019)Fast Message Franking: From Invisible Salamanders to Encryptment., , , и . IACR Cryptology ePrint Archive, (2019)Weak Fiat-Shamir Attacks on Modern Proof Systems., , , и . SP, стр. 199-216. IEEE, (2023)Partitioning Oracle Attacks., , и . USENIX Security Symposium, стр. 195-212. USENIX Association, (2021)Zero-Knowledge Middleboxes., , , , и . IACR Cryptol. ePrint Arch., (2021)Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption., , , , и . CRYPTO (3), том 11694 из Lecture Notes in Computer Science, стр. 222-250. Springer, (2019)Context Discovery and Commitment Attacks - How to Break CCM, EAX, SIV, and More., , , и . EUROCRYPT (4), том 14007 из Lecture Notes in Computer Science, стр. 379-407. Springer, (2023)Pancake: Frequency Smoothing for Encrypted Data Stores., , , , , , и . USENIX Security Symposium, стр. 2451-2468. USENIX Association, (2020)Spartan and Bulletproofs are Simulation-Extractable (for Free!)., и . EUROCRYPT (2), том 14005 из Lecture Notes in Computer Science, стр. 531-562. Springer, (2023)Zombie: Middleboxes that Don't Snoop., , , , , и . NSDI, USENIX Association, (2024)