Star 0
Month Quarter Year
#N/A #N/A #N/A
Title Event
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks 40th IEEE Symposium on Security and Privacy
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure ACM CCS 2018
Prime and Prejudice: Primality Testing Under Adversarial Conditions ACM CCS 2018
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage 39th IEEE Symposium on Security and Privacy
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives ACM CCS 2017
The TypTop System: Personalized Typo-tolerant Password Checking ACM CCS 2017
POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection WOOT '17