Search for persons
X
?
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security ,
2
When Frodo Flips : End-to-End Key Recovery on FrodoKEM v..:
, In:
?
Theory of Cryptography; Lecture Notes in Computer Science ,
3
Secure Sampling with Sublinear Communication:
, In:
?
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security ,
4
Compressed Oblivious Encoding for Homomorphically Encrypted..:
, In:
?
Lecture Notes in Computer Science; Advances in Cryptology – EUROCRYPT 2021 ,
5
The More the Merrier: Reducing the Cost of Large Scale MPC:
, In:
?
2019 IEEE Conference on Communications and Network Security (CNS) ,
10
Location Leakage from Network Access Patterns:
, In:
?
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security ,
12
Stormy : Statistics in Tor by Measuring Securely:
, In:
?
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security ,
15