All Stories

  1. Cryptanalysis of a Privacy-Preserving Aggregation Protocol
  2. A Methodology for Information Flow Experiments
  3. Automated Experiments on Ad Privacy Settings
  4. Asynchronous Computational VSS with Reduced Communication Complexity
  5. SLAM Using Relational Trees and Semantics
  6. SLAM Using Relational Trees and Semantics
  7. A Cache Trace Attack on CAMELLIA
  8. An Enhanced Differential Cache Attack on CLEFIA for Large Cache Lines