-
1
Passive SSH key compromise via lattices
Published 2023“…ACM|Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security…”
Get full text
Article -
2
Scalable Multiparty Garbling
Published 2023“…ACM|Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security…”
Get full text
Article -
3
Geometry of Sensitivity: Twice Sampling and Hybrid Clipping in Differential Privacy with Optimal Gaussian Noise and Application to Deep Learning
Published 2023“…ACM|Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security…”
Get full text
Article -
4
Analyzing the Real-World Security of the Algorand Blockchain
Published 2023“…ACM|Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security…”
Get full text
Article -
5
Speranza: Usable, Privacy-friendly Software Signing
Published 2023“…ACM|Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security…”
Get full text
Article