publication venue for
- On the Privacy of Counting Bloom Filters Under a Black-Box Attacker. 20. 2023
- Breaking Cuckoo Hash: Black Box Attacks. 19:2421-2427. 2022
- On the privacy of counting Bloom filters. 20:1488 -1499. 2022
- On the Security of the K Minimum Values (KMV) Sketch. 19:3539-3545. 2021
- A Key for John Doe: Modeling and Designing Anonymous Password-Authenticated Key Exchange Protocols. 18:1336-1356. 2021
- A hardware-software approach for on-line soft error mitigation in interrupt-driven applications. 13:502-508. 2016
- Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System. 12:312-325. 2015
- Fault Injection in Modern Microprocessors Using On-Chip Debugging Infrastructures. 8:308-314. 2011