Towards Practical Differentially Private Convex Optimization |
40th IEEE Symposium on Security and Privacy
|
A Tangled Curl: Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme |
Black Hat USA 2018
|
Mobile Point of Scam: Attacking the Square Reader |
Black Hat USA 2015
|
Say It Ain't So - An Implementation of Deniable Encryption |
Black Hat Asia 2014
|