publication venue for On the Privacy of Counting Bloom Filters Under a Black-Box Attacker. 20. 2023 Breaking Cuckoo Hash: Black Box Attacks. 19:2421-2427. 2022 On the privacy of counting Bloom filters. 20:1488 -1499. 2022 On the Security of the K Minimum Values (KMV) Sketch. 19:3539-3545. 2021 A Key for John Doe: Modeling and Designing Anonymous Password-Authenticated Key Exchange Protocols. 18:1336-1356. 2021 A hardware-software approach for on-line soft error mitigation in interrupt-driven applications. 13:502-508. 2016 Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System. 12:312-325. 2015 Fault Injection in Modern Microprocessors Using On-Chip Debugging Infrastructures. 8:308-314. 2011