Raluca Ada Popa (2022) |
Secure
Computation in Practice |
Ross
Anderson (2021) |
Cryptography
and the Changing Landscape of Payment Fraud |
Giuseppe
Ateniese (2020) |
Is
AI taking over the world? No, but it’s making it less private. |
Gilles
Barthe (2018) |
Formal
Verification of Side-Channel Resistance |
Karthikeyan
Bhargavan (2017) |
Towards High-Assurance Cryptographic Software |
Srdjan
Capkun (2016) |
Securing
Positioning: From GPS to IoT |
Ed
Dawson (2011) |
Authorisation
Models for Dynamic Environments |
Robert Deng (2006) |
Inference Control and
Private Information Retrieval - Two Sides of One Tapestry |
Srini
Devadas (2019) |
Toward
Secure High-Performance Computer Architectures |
Juan
Garay (2019) |
Foundational
Aspects of Blockchain Protocols |
Craig
Gentry (2009) |
Fully Homomorphic Encryption Using Ideal Lattices |
Matthew
Green (2015) |
From
Strong Mathematics to Weak Cryptography |
How not to Generate Random Numbers? | |
Susan
Hohenberger (2022) |
Chosen
Ciphertext Security from Injective Trapdoor Functions |
Antoine
Joux (2009) |
Can We Settle Cryptography’s Hash? |
Angelos
Keromytis (2009) |
Voice over IP: Risks, Threats and Vulnerabilities |
Hugo
Krawzcyk (2008) |
Getting
Serious about Key Derivation Functions |
Anja
Lehmann (2021) |
Privacy-Preserving
Authentication: Concepts, Applications, and New Advances |
Refik
Molva (2011) |
Privacy
in Social Networks: Can P2P Help? |
Wenbo
Mao (2007) |
Grid
Security from Two Levels of Virtualization |
Victor
Miller (2008) |
Elliptic
Curves and Cryptography: A 23 Year Perspective |
David
Naccache (2004) |
Exploiting
Side Information |
Peng
Ning (2012) |
Cloud Computing Infrastructure Security |
Bryan Parno (2013) |
Bootstrapping Cloud Security |
Adrian
Perrig (2020) |
Global
Communication Guarantees in the Presence of Adversaries |
Mike
Reiter (2009) |
Better Architectures and New Applications for Coarse Network Monitoring |
The Emergence of Authenticated Encryption | |
Avi
Rubin (2005) |
Security
and Privacy Issues in RFID Technologies |
Ahmad-Reza Sadeghi
(2013) |
Selected Topics in Mobile Security and Trusted Computing |
Nat
Sakimura (2021) |
Digital
Being |
George
Sherman (2005) |
Information
Security Technologies as Enablers of Banking Systems |
Vitaly
Shmatikov (2015) |
All Your SSL are Belong to Us |
Victor
Shoup (2005) |
Sequence
of Games: A Technique for Taming Complexity in Security Proofs |
Haya
Shulman (2018) |
On
RPKI’s Deployment and Security of BGP |
Sal
Stolfo (2008) |
Insider
Threat Detection: Host and Network Monitoring Techniques |
Francois Theberge
(2013) |
Ensemble Clustering for Graphs-Based Data |
Doug
Tygar (2017) |
Adversarial Machine Learning |
Bogdan
Warinschi (2016) |
Foundations
of Hardware-Based Attested Computation and Applications of SGX |
Hongjun
Wu (2012) |
JH
in the NIST Hash Function Competition |
Yiqun
Lisa Yin (2005) |
Recent
Advances in Hash Function Research |
Moti
Yung (2003) |
Key-Insulated Public Key
Cryptosystems |
Moti Yung (2012) | Applied Cryptography and Network Security - 10 years in the past and 10 years in the future |
Jianying
Zhou (2003) |
Non-repudiation
in e-Commerce and e-Government |