Theory and Practice of Finding Eviction Sets |
40th IEEE Symposium on Security and Privacy
|
Pinpointing Insecure Cryptographic Keys from Execution Traces |
ACM CCS 2018
|
Symbolic Proofs for Lattice-Based Cryptography |
ACM CCS 2018
|
Back to the drawing board: Revisiting the design of optimal location privacy-preserving mechanisms |
ACM CCS 2017
|
Attribute-Based Encryption in the Generic Group Model: Automated Proofs and New Constructions |
ACM CCS 2017
|
A Fast and Verified Software Stack for Secure Function Evaluation |
ACM CCS 2017
|
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services |
ACM CCS 2017
|
Automated Verification of Group Key Agreement Protocols |
35th IEEE Symposium on Security and Privacy
|