Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks |
40th IEEE Symposium on Security and Privacy
|
Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure |
ACM CCS 2018
|
Prime and Prejudice: Primality Testing Under Adversarial Conditions |
ACM CCS 2018
|
Improved Reconstruction Attacks on Encrypted Data Using Range Query Leakage |
39th IEEE Symposium on Security and Privacy
|
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives |
ACM CCS 2017
|
The TypTop System: Personalized Typo-tolerant Password Checking |
ACM CCS 2017
|
POTUS: Probing Off-The-Shelf USB Drivers with Symbolic Fault Injection |
WOOT '17
|