Title |
Conference |
Tags |
Compact Multi-Signatures for Smaller Blockchains |
Asiacrypt2018-2018 - Brisbane, Australia |
|
Threshold Cryptosystems From Threshold Fully Homomorphic Encryption |
Crypto2018-2018 - Santa Barbara, USA |
|
Verifiable Delay Functions |
Crypto2018-2018 - Santa Barbara, USA |
|
Quasi-Optimal SNARGs via Linear Multi-Prover Interactive Proofs |
EuroCryptTelAviv-2018 - Tel Aviv, Israel |
|
Private Puncturable PRFs From Standard Lattice Assumptions |
EuroCrypt-2017 - paris,france |
|
Lattice-Based SNARGs and Their Application to More Efficient Obfuscation |
EuroCrypt-2017 - paris,france |
|
Applied crypto: the good, the bad, and the future |
EuroSP-2017 - paris,france |
|
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics |
NSDI-2017 - boston,usa |
|
Provisions: Proofs of solvency for cryptocurrencies |
RWC-2016 - stanford,usa |
|
PowerSpy: Location Tracking Using Mobile Device Power Analysis |
SecuritySymposium-2015 - washington,USA |
|
Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation |
EuroCrypt-2015 - Soia,Bulgaria |
|
Hosting Services on an Untrusted Cloud |
EuroCrypt-2015 - Soia,Bulgaria |
|
Bivariate Polynomials Modulo Composites and their Applications |
AsiaCrypt-2014 - kaohsiung,taiwan |
|
Password Managers: Attacks and Defenses |
usenix-2014 - san diego,usa |
|
After Lunch Break Crypto |
usenix-2014 - san diego,usa |
|
Tick Tock: Building Browser Red Pills from Timing Side Channels |
Woot-2014 - san diego,usa |
|
Low Overhead Broadcast Encryption from Multilinear Maps |
crypto-2014 - california,usa |
|
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation |
crypto-2014 - california,usa |
|
An Experimental Study of TLS Forward Secrecy Deployment (Slides) |
w2sp-2014 - California,USA |
|
Fully Key-Homomorphic Encryption, Arithmetic Circuit ABE and Compact Garbled Circuits |
EuroCrypt-2014 - copenhagen,denmark |
|
New Frontiers in Cryptography |
Trustycon-2014 - San Francisco,USA |
|
The PRNG Debate |
RSACon-2014 - San Francisco, USA |
|
Function-Private Subspace-Membership Encryption and Its Applications |
asiacrypt-2013 - Bengalore,India |
|
Constrained Pseudorandom Functions and Their Applications |
asiacrypt-2013 - Bengalore,India |
|
The Cryptographers' Panel |
RSA USA-2013 - San Francisco, USA |
|
Pairing-based Cryptography: Past, Present, and Future |
ASIACRYPT-2012 - Beijing,China |
Security
|
Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks |
USENIX-2012 - Washington, D.C. |
|
Evading Censorship with Browser-Based Proxies |
Privacy Enhancing Technologies Symposium-2012 - Vigo, Spain |
|
The Case For Ubiquitous Transport-Level Encryption |
19th USENIX Security Symposium-2010 - Washington DC, USA |
Security
|
Busting Frame Busting: A Study Of Clickjacking Vulnerabilities On Popular Sites (Invited Talk) |
4th USENIX Workshop on Offensive Technologies -2010 - Washington DC, USA |
Security
|
Framing Attacks On Smart Phones And Dumb Routers: Tap-Jacking And Geo-Localization Attacks |
4th USENIX Workshop on Offensive Technologies -2010 - Washington DC, USA |
Security
|
Webseclab Security Education Workbench |
3rd Workshop on Cyber Security Experimentation and Test -2010 - Washington DC, USA |
Security
|
An Analysis Of Private Browsing Modes In Modern Browsers |
19th USENIX Security Symposium-2010 - Washington DC, USA |
Security
Analysis
|
Kartograph : Finding A Needle In A Haystack Or How To Apply Reverse Engineering Techniques To Cheat Atvideo Games |
DEF CON-18 - Las Vegas, USA |
Security
|
Embedded Management Interfaces: Emerging Massive Insecurity |
Blackhat USA-2009 - Las Vegas, USA |
Security
|
Cryptographic Keys |
17th USENIX Security Symposium-2008 - San Jose, USA |
Security
|
Transaction Generators: Root Kits For Web |
2nd USENIX Workshop on Hot Topics in Security-2007 - Boston, USA |
Security
|
Sane: A Protection Architecture For Enterprise Networks |
15th USENIX Security Symposium-2006 - Vancouver, Canada |
Security
|
Stronger Password Authentication Using Browser Extensions |
14th USENIX Security Symposium-2005 - Baltimore, USA |
Security
Browser
|
Remote Timing Attacks Are Practical |
12th USENIX Security Symposium-2003 - Washington DC, USA |
Security
|
The Road Less Traveled |
12th USENIX Security Symposium-2003 - Washington DC, USA |
Security
|
Keynote:Recent Crypto Attacks and a New Approach to PKI |
First-2002 - Waikoala Village,Hawaii |
|
A Method For Fast Revocation Of Public Key Certificates And Security Capabilities |
10th USENIX Security Symposium-2001 - Washington DC, USA |
Security
Privacy
|
Building Intrusion-Tolerant Applications |
8th USENIX Security Symposium-1999 - Washington DC, USA |
Security
|