What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Thomas Ristenpart
Google Scholar
87
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/uss
Exploiting Leakage in Password Managers via Injection Attacks.
Andrés Fábrega
Armin Namavari
Rachit Agarwal
Ben Nassi
Thomas Ristenpart
2024
conf/uss
Navigating Traumatic Stress Reactions During Computer Security Interventions.
Lana Ramjit
Natalie Dolci
Francesca Rossi
Ryan Garcia
Thomas Ristenpart
Dana Cuomo
2024
conf/crypto
Is ML-Based Cryptanalysis Inherently Limited? Simulating Cryptographic Adversaries via Gradient-Based Methods.
Avital Shafran
Eran Malach
Thomas Ristenpart
Gil Segev
Stefano Tessaro
2024
conf/sp
Private Hierarchical Governance for Encrypted Messaging.
Armin Namavari
Barry Wang
Sanketh Menda
Ben Nassi
Nirvan Tyagi
James Grimmelmann
Amy X. Zhang
Thomas Ristenpart
2024
conf/sp
SoK: Safer Digital-Safety Research Involving At-Risk Users.
Rosanna Bellini
Emily Tseng
Noel Warford
Alaa Daffalla
Tara Matthews
Sunny Consolvo
Jill Palzkill Woelfer
Patrick Gage Kelley
Michelle L. Mazurek
Dana Cuomo
Nicola Dell
Thomas Ristenpart
2024
conf/sp
Injection Attacks Against End-to-End Encrypted Applications.
Andrés Fábrega
Carolina Ortega Pérez
Armin Namavari
Ben Nassi
Rachit Agarwal
Thomas Ristenpart
2023
conf/uss
Account Security Interfaces: Important, Unintuitive, and Untrustworthy.
Alaa Daffalla
Marina Sanusi Bohuk
Nicola Dell
Rosanna Bellini
Thomas Ristenpart
2023
conf/uss
The Digital-Safety Risks of Financial Technologies for Survivors of Intimate Partner Violence.
Rosanna Bellini
Kevin Lee
Megan A. Brown
Jeremy Shaffer
Rasika Bhalerao
Thomas Ristenpart
2023
conf/uss
Araña: Discovering and Characterizing Password Guessing Attacks in Practice.
Mazharul Islam
Marina Sanusi Bohuk
Paul Chung
Thomas Ristenpart
Rahul Chatterjee
2023
conf/eurocrypt
Context Discovery and Commitment Attacks - How to Break CCM, EAX, SIV, and More.
Sanketh Menda
Julia Len
Paul Grubbs
Thomas Ristenpart
2022
conf/uss
Might I Get Pwned: A Second Generation Compromised Credential Checking Service.
Bijeeta Pal
Mazharul Islam
Marina Sanusi Bohuk
Nick Sullivan
Luke Valenta
Tara Whalen
Christopher A. Wood
Thomas Ristenpart
Rahul Chatterjee
2022
conf/uss
Orca: Blocklisting in Sender-Anonymous Messaging.
Nirvan Tyagi
Julia Len
Ian Miers
Thomas Ristenpart
2022
conf/uss
Gossamer: Securely Measuring Password-based Logins.
Marina Sanusi Bohuk
Mazharul Islam
Suleman Ahmad
Michael M. Swift
Thomas Ristenpart
Rahul Chatterjee
2022
conf/uss
Increasing Adversarial Uncertainty to Scale Private Similarity Testing.
Yiqing Hua
Armin Namavari
Kaishuo Cheng
Mor Naaman
Thomas Ristenpart
2022
conf/eurocrypt
A Fast and Simple Partially Oblivious PRF, with Applications.
Nirvan Tyagi
Sofía Celi
Thomas Ristenpart
Nick Sullivan
Stefano Tessaro
Christopher A. Wood
2022
conf/asiacrypt
Authenticated Encryption with Key Identification.
Julia Len
Paul Grubbs
Thomas Ristenpart
2021
conf/uss
Searching Encrypted Data with Size-Locked Indexes.
Min Xu
Armin Namavari
David Cash
Thomas Ristenpart
2021
conf/uss
The Role of Computer Security Customer Support in Helping Survivors of Intimate Partner Violence.
Yixin Zou
Allison McDonald
Julia Narakornpichit
Nicola Dell
Thomas Ristenpart
Kevin A. Roundy
Florian Schaub
Acar Tamersoy
2021
conf/uss
Partitioning Oracle Attacks.
Julia Len
Paul Grubbs
Thomas Ristenpart
2021
conf/sp
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse.
Kurt Thomas
Devdatta Akhawe
Michael D. Bailey
Dan Boneh
Elie Bursztein
Sunny Consolvo
Nicola Dell
Zakir Durumeric
Patrick Gage Kelley
Deepak Kumar
Damon McCoy
Sarah Meiklejohn
Thomas Ristenpart
Gianluca Stringhini
2020
conf/uss
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums.
Emily Tseng
Rosanna Bellini
Nora McDonald
Matan Danos
Rachel Greenstadt
Damon McCoy
Nicola Dell
Thomas Ristenpart
2020
conf/uss
Pancake: Frequency Smoothing for Encrypted Data Stores.
Paul Grubbs
Anurag Khandelwal
Marie-Sarah Lacharité
Lloyd Brown
Lucy Li
Rachit Agarwal
Thomas Ristenpart
2020
conf/sp
The Many Kinds of Creepware Used for Interpersonal Attacks.
Kevin A. Roundy
Paula Barmaimon Mendelberg
Nicola Dell
Damon McCoy
Daniel Nissani
Thomas Ristenpart
Acar Tamersoy
2019
conf/ccs
Traceback for End-to-End Encrypted Messaging.
Nirvan Tyagi
Ian Miers
Thomas Ristenpart
2019
conf/ccs
Protocols for Checking Compromised Credentials.
Lucy Li
Bijeeta Pal
Junade Ali
Nick Sullivan
Rahul Chatterjee
Thomas Ristenpart
2019
conf/uss
Clinical Computer Security for Victims of Intimate Partner Violence.
Sam Havron
Diana Freed
Rahul Chatterjee
Damon McCoy
Nicola Dell
Thomas Ristenpart
2019
conf/crypto
Asymmetric Message Franking: Content Moderation for Metadata-Private End-to-End Encryption.
Nirvan Tyagi
Paul Grubbs
Julia Len
Ian Miers
Thomas Ristenpart
2019
conf/sp
Blind Certificate Authorities.
Liang Wang
Gilad Asharov
Rafael Pass
Thomas Ristenpart
Abhi Shelat
2019
conf/sp
Beyond Credential Stuffing: Password Similarity Models Using Neural Networks.
Bijeeta Pal
Tal Daniel
Rahul Chatterjee
Thomas Ristenpart
2018
conf/uss
BurnBox: Self-Revocable Encryption in a World Of Compelled Access.
Nirvan Tyagi
Muhammad Haris Mughees
Thomas Ristenpart
Ian Miers
2018
conf/crypto
Fast Message Franking: From Invisible Salamanders to Encryptment.
Yevgeniy Dodis
Paul Grubbs
Thomas Ristenpart
Joanne Woodage
2018
conf/sp
The Spyware Used in Intimate Partner Violence.
Rahul Chatterjee
Periwinkle Doerfler
Hadas Orgad
Sam Havron
Jackeline Palmer
Diana Freed
Karen Levy
Nicola Dell
Damon McCoy
Thomas Ristenpart
2017
conf/ccs
Using Program Analysis to Synthesize Sensor Spoofing Attacks.
Ivan Pustogarov
Thomas Ristenpart
Vitaly Shmatikov
2017
conf/ccs
The TypTop System: Personalized Typo-Tolerant Password Checking.
Rahul Chatterjee
Joanne Woodage
Yuval Pnueli
Anusha Chowdhury
Thomas Ristenpart
2017
conf/ccs
Machine Learning Models that Remember Too Much.
Congzheng Song
Thomas Ristenpart
Vitaly Shmatikov
2017
conf/crypto
Message Franking via Committing Authenticated Encryption.
Paul Grubbs
Jiahui Lu
Thomas Ristenpart
2017
conf/crypto
A New Distribution-Sensitive Secure Sketch and Popularity-Proportional Hashing.
Joanne Woodage
Rahul Chatterjee
Yevgeniy Dodis
Ari Juels
Thomas Ristenpart
2017
conf/crypto
Key Rotation for Authenticated Encryption.
Adam Everspaugh
Kenneth G. Paterson
Thomas Ristenpart
Samuel Scott
2017
conf/sp
Side-Channel Attacks on Shared Search Indexes.
Liang Wang
Paul Grubbs
Jiahui Lu
Vincent Bindschaedler
David Cash
Thomas Ristenpart
2017
conf/sp
Leakage-Abuse Attacks against Order-Revealing Encryption.
Paul Grubbs
Kevin Sekniqi
Vincent Bindschaedler
Muhammad Naveed
Thomas Ristenpart
2017
conf/eurocrypt
Modifying an Enciphering Scheme After Deployment.
Paul Grubbs
Thomas Ristenpart
Yuval Yarom
2016
conf/ccs
Breaking Web Applications Built On Top of Encrypted Data.
Paul Grubbs
Richard McPherson
Muhammad Naveed
Thomas Ristenpart
Vitaly Shmatikov
2016
conf/uss
Stealing Machine Learning Models via Prediction APIs.
Florian Tramèr
Fan Zhang
Ari Juels
Michael K. Reiter
Thomas Ristenpart
2016
conf/sp
pASSWORD tYPOS and How to Correct Them Securely.
Rahul Chatterjee
Anish Athayle
Devdatta Akhawe
Ari Juels
Thomas Ristenpart
2016
conf/eurocrypt
Honey Encryption Beyond Message Recovery Security.
Joseph Jaeger
Thomas Ristenpart
Qiang Tang
2015
conf/ccs
Seeing through Network-Protocol Obfuscation.
Liang Wang
Kevin P. Dyer
Aditya Akella
Thomas Ristenpart
Thomas Shrimpton
2015
conf/ccs
Model Inversion Attacks that Exploit Confidence Information and Basic Countermeasures.
Matt Fredrikson
Somesh Jha
Thomas Ristenpart
2015
conf/ccs
Leakage-Abuse Attacks Against Searchable Encryption.
David Cash
Paul Grubbs
Jason Perry
Thomas Ristenpart
2015
conf/uss
A Placement Vulnerability Study in Multi-Tenant Public Clouds.
Venkatanathan Varadarajan
Yinqian Zhang
Thomas Ristenpart
Michael M. Swift
2015
conf/uss
The Pythia PRF Service.
Adam Everspaugh
Rahul Chatterjee
Samuel Scott
Ari Juels
Thomas Ristenpart
2015
conf/sp
Cracking-Resistant Password Vaults Using Natural Language Encoders.
Rahul Chatterjee
Joseph Bonneau
Ari Juels
Thomas Ristenpart
2015
conf/eurocrypt
A Formal Treatment of Backdoored Pseudorandom Generators.
Yevgeniy Dodis
Chaya Ganesh
Alexander Golovnev
Ari Juels
Thomas Ristenpart
2014
conf/ccs
Cross-Tenant Side-Channel Attacks in PaaS Clouds.
Yinqian Zhang
Ari Juels
Michael K. Reiter
Thomas Ristenpart
2014
conf/ccs
Formatted Encryption Beyond Regular Languages.
Daniel Luchaup
Thomas Shrimpton
Thomas Ristenpart
Somesh Jha
2014
conf/uss
Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing.
Matthew Fredrikson
Eric Lantz
Somesh Jha
Simon M. Lin
David Page
Thomas Ristenpart
2014
conf/uss
LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes.
Daniel Luchaup
Kevin P. Dyer
Somesh Jha
Thomas Ristenpart
Thomas Shrimpton
2014
conf/uss
Scheduler-based Defenses against Cross-VM Side-channels.
Venkatanathan Varadarajan
Thomas Ristenpart
Michael M. Swift
2014
conf/uss
On the Practical Exploitability of Dual EC in TLS Implementations.
Stephen Checkoway
Ruben Niederhagen
Adam Everspaugh
Matthew Green
Tanja Lange
Thomas Ristenpart
Daniel J. Bernstein
Jake Maskiewicz
Hovav Shacham
Matthew Fredrikson
2014
conf/sp
Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG.
Adam Everspaugh
Yan Zhai
Robert Jellinek
Thomas Ristenpart
Michael M. Swift
2014
conf/eurocrypt
Honey Encryption: Security Beyond the Brute-Force Bound.
Ari Juels
Thomas Ristenpart
2013
conf/ccs
Protocol misidentification made easy with format-transforming encryption.
Kevin P. Dyer
Scott E. Coull
Thomas Ristenpart
Thomas Shrimpton
2013
conf/uss
FIE on Firmware: Finding Vulnerabilities in Embedded Systems Using Symbolic Execution.
Drew Davidson
Benjamin Moench
Thomas Ristenpart
Somesh Jha
2013
conf/uss
DupLESS: Server-Aided Encryption for Deduplicated Storage.
Sriram Keelveedhi
Mihir Bellare
Thomas Ristenpart
2013
conf/crypto
The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries.
Thomas Ristenpart
Scott Yilek
2013
conf/eurocrypt
Message-Locked Encryption and Secure Deduplication.
Mihir Bellare
Sriram Keelveedhi
Thomas Ristenpart
2012
conf/ccs
Cross-VM side channels and their use to extract private keys.
Yinqian Zhang
Ari Juels
Michael K. Reiter
Thomas Ristenpart
2012
conf/ccs
Resource-freeing attacks: improve your cloud performance (at your neighbor's expense).
Venkatanathan Varadarajan
Thawan Kooburat
Benjamin Farley
Thomas Ristenpart
Michael M. Swift
2012
conf/crypto
To Hash or Not to Hash Again? (In)Differentiability Results for H 2 and HMAC.
Yevgeniy Dodis
Thomas Ristenpart
John P. Steinberger
Stefano Tessaro
2012
conf/crypto
Multi-instance Security and Its Application to Password-Based Cryptography.
Mihir Bellare
Thomas Ristenpart
Stefano Tessaro
2012
conf/sp
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail.
Kevin P. Dyer
Scott E. Coull
Thomas Ristenpart
Thomas Shrimpton
2012
conf/tcc
Randomness Condensers for Efficiently Samplable, Seed-Dependent Sources.
Yevgeniy Dodis
Thomas Ristenpart
Salil P. Vadhan
2011
conf/eurocrypt
Careful with Composition: Limitations of the Indifferentiability Framework.
Thomas Ristenpart
Hovav Shacham
Thomas Shrimpton
2011
conf/asiacrypt
Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol.
Kenneth G. Paterson
Thomas Ristenpart
Thomas Shrimpton
2010
conf/ndss
When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography.
Thomas Ristenpart
Scott Yilek
2010
conf/asiacrypt
Random Oracles with(out) Programmability.
Marc Fischlin
Anja Lehmann
Thomas Ristenpart
Thomas Shrimpton
Martijn Stam
Stefano Tessaro
2009
conf/ccs
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
Thomas Ristenpart
Eran Tromer
Hovav Shacham
Stefan Savage
2009
conf/eurocrypt
Salvaging Merkle-Damgård for Practical Applications.
Yevgeniy Dodis
Thomas Ristenpart
Thomas Shrimpton
2009
conf/eurocrypt
Simulation without the Artificial Abort: Simplified Proof and Improved Concrete Security for Waters' IBE Scheme.
Mihir Bellare
Thomas Ristenpart
2009
conf/asiacrypt
Hedged Public-Key Encryption: How to Protect against Bad Randomness.
Mihir Bellare
Zvika Brakerski
Moni Naor
Thomas Ristenpart
Gil Segev
Hovav Shacham
Scott Yilek
2009
conf/sacrypt
Format-Preserving Encryption.
Mihir Bellare
Thomas Ristenpart
Phillip Rogaway
Till Stegers
2008
conf/uss
Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs.
Thomas Ristenpart
Gabriel Maganis
Arvind Krishnamurthy
Tadayoshi Kohno
2008
conf/crypto
Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles.
Mihir Bellare
Marc Fischlin
Adam O'Neill
Thomas Ristenpart
2007
conf/fse
How to Enrich the Message Space of a Cipher.
Thomas Ristenpart
Phillip Rogaway
2007
conf/eurocrypt
The Power of Proofs-of-Possession: Securing Multiparty Signatures against Rogue-Key Attacks.
Thomas Ristenpart
Scott Yilek
2007
conf/asiacrypt
How to Build a Hash Function from Any Collision-Resistant Function.
Thomas Ristenpart
Thomas Shrimpton
2006
conf/asiacrypt
Multi-Property-Preserving Hash Domain Extension and the EMD Transform.
Mihir Bellare
Thomas Ristenpart
2006
conf/acsac
Back to the Future: A Framework for Automatic Malware Removal and System Repair.
Francis Hsu
Hao Chen
Thomas Ristenpart
Jason Li
Zhendong Su
Coauthors
Abhi Shelat
(1)
Acar Tamersoy
(2)
Adam Everspaugh
(4)
Adam O'Neill
(1)
Aditya Akella
(1)
Alaa Daffalla
(2)
Alexander Golovnev
(1)
Allison McDonald
(1)
Amy X. Zhang
(1)
Andrés Fábrega
(2)
Anish Athayle
(1)
Anja Lehmann
(1)
Anurag Khandelwal
(1)
Anusha Chowdhury
(1)
Ari Juels
(9)
Armin Namavari
(5)
Arvind Krishnamurthy
(1)
Avital Shafran
(1)
Barry Wang
(1)
Ben Nassi
(3)
Benjamin Farley
(1)
Benjamin Moench
(1)
Bijeeta Pal
(3)
Carolina Ortega Pérez
(1)
Chaya Ganesh
(1)
Christopher A. Wood
(2)
Congzheng Song
(1)
Damon McCoy
(5)
Dan Boneh
(1)
Dana Cuomo
(2)
Daniel J. Bernstein
(1)
Daniel Luchaup
(2)
Daniel Nissani
(1)
David Cash
(3)
David Page
(1)
Deepak Kumar
(1)
Devdatta Akhawe
(2)
Diana Freed
(2)
Drew Davidson
(1)
Elie Bursztein
(1)
Emily Tseng
(2)
Eran Malach
(1)
Eran Tromer
(1)
Eric Lantz
(1)
Fan Zhang
(1)
Florian Schaub
(1)
Florian Tramèr
(1)
Francesca Rossi
(1)
Francis Hsu
(1)
Gabriel Maganis
(1)
Gianluca Stringhini
(1)
Gil Segev
(2)
Gilad Asharov
(1)
Hadas Orgad
(1)
Hao Chen
(1)
Hovav Shacham
(4)
Ian Miers
(4)
Ivan Pustogarov
(1)
Jackeline Palmer
(1)
Jake Maskiewicz
(1)
James Grimmelmann
(1)
Jason Li
(1)
Jason Perry
(1)
Jeremy Shaffer
(1)
Jiahui Lu
(2)
Jill Palzkill Woelfer
(1)
Joanne Woodage
(3)
John P. Steinberger
(1)
Joseph Bonneau
(1)
Joseph Jaeger
(1)
Julia Len
(5)
Julia Narakornpichit
(1)
Junade Ali
(1)
Kaishuo Cheng
(1)
Karen Levy
(1)
Kenneth G. Paterson
(2)
Kevin A. Roundy
(2)
Kevin Lee
(1)
Kevin P. Dyer
(4)
Kevin Sekniqi
(1)
Kurt Thomas
(1)
Lana Ramjit
(1)
Liang Wang
(3)
Lloyd Brown
(1)
Lucy Li
(2)
Luke Valenta
(1)
Marc Fischlin
(2)
Marie-Sarah Lacharité
(1)
Marina Sanusi Bohuk
(4)
Martijn Stam
(1)
Matan Danos
(1)
Matt Fredrikson
(1)
Matthew Fredrikson
(2)
Matthew Green
(1)
Mazharul Islam
(3)
Megan A. Brown
(1)
Michael D. Bailey
(1)
Michael K. Reiter
(3)
Michael M. Swift
(5)
Michelle L. Mazurek
(1)
Mihir Bellare
(8)
Min Xu
(1)
Moni Naor
(1)
Mor Naaman
(1)
Muhammad Haris Mughees
(1)
Muhammad Naveed
(2)
Natalie Dolci
(1)
Nick Sullivan
(3)
Nicola Dell
(8)
Nirvan Tyagi
(6)
Noel Warford
(1)
Nora McDonald
(1)
Patrick Gage Kelley
(2)
Paul Chung
(1)
Paul Grubbs
(12)
Paula Barmaimon Mendelberg
(1)
Periwinkle Doerfler
(1)
Phillip Rogaway
(2)
Qiang Tang
(1)
Rachel Greenstadt
(1)
Rachit Agarwal
(3)
Rafael Pass
(1)
Rahul Chatterjee
(12)
Rasika Bhalerao
(1)
Richard McPherson
(1)
Robert Jellinek
(1)
Rosanna Bellini
(4)
Ruben Niederhagen
(1)
Ryan Garcia
(1)
Salil P. Vadhan
(1)
Sam Havron
(2)
Samuel Scott
(2)
Sanketh Menda
(2)
Sarah Meiklejohn
(1)
Scott E. Coull
(2)
Scott Yilek
(4)
Simon M. Lin
(1)
Sofía Celi
(1)
Somesh Jha
(5)
Sriram Keelveedhi
(2)
Stefan Savage
(1)
Stefano Tessaro
(5)
Stephen Checkoway
(1)
Suleman Ahmad
(1)
Sunny Consolvo
(2)
Tadayoshi Kohno
(1)
Tal Daniel
(1)
Tanja Lange
(1)
Tara Matthews
(1)
Tara Whalen
(1)
Thawan Kooburat
(1)
Thomas Ristenpart
(87)
Thomas Shrimpton
(10)
Till Stegers
(1)
Venkatanathan Varadarajan
(3)
Vincent Bindschaedler
(2)
Vitaly Shmatikov
(3)
Yan Zhai
(1)
Yevgeniy Dodis
(6)
Yinqian Zhang
(3)
Yiqing Hua
(1)
Yixin Zou
(1)
Yuval Pnueli
(1)
Yuval Yarom
(1)
Zakir Durumeric
(1)
Zhendong Su
(1)
Zvika Brakerski
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to