Easy plane magnetic tunnel junction as an entropy source for computingJonathan SunChristopher Safranskiet al.2023MMM 2023
2nd Workshop on Data Integrity and Secure Cloud Computing (DISCC)Pradip BoseJennifer Dworaket al.2023MICRO 2023
Composable Oblivious Pseudo-Random Functions via Garbled CircuitsSebastian FallerAstrid Ottenhueset al.2023LatinCrypt 2023
Efficient Pruning for Machine Learning under Homomorphic EncryptionEhud AharoniMoran Baruchet al.2023ESORICS 2023
Towards a Practical Defense Against Adversarial Attacks on Deep Learning-Based Malware Detectors via Randomized SmoothingDaniel GibertGiulio Zizzoet al.2023ESORICS 2023
Graph-Theoretic Algorithms for the Alternating Trilinear Form Equivalence ProblemWard Beullens2023CRYPTO 2023
Security Analysis of the WhatsApp End-to-End Encrypted Backup ProtocolGareth T. DaviesSebastian Falleret al.2023CRYPTO 2023
Lattice-Based Succinct Arguments for NP with Polylogarithmic-Time VerificationJonathan BootleAlessandro Chiesaet al.2023CRYPTO 2023
A Framework for Practical Anonymous Credentials from LatticesJonathan BootleVadim Lyubashevskyet al.2023CRYPTO 2023