Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. [Citation Graph (, )][DBLP]
Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security. [Citation Graph (, )][DBLP]
On Cryptographic Schemes Based on Discrete Logarithms and Factoring. [Citation Graph (, )][DBLP]
Asymptotically Optimal and Private Statistical Estimation. [Citation Graph (, )][DBLP]
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT. [Citation Graph (, )][DBLP]
Saturation Attack on the Block Cipher HIGHT. [Citation Graph (, )][DBLP]
Extensions of the Cube Attack Based on Low Degree Annihilators. [Citation Graph (, )][DBLP]
An Analysis of the Compact XSL Attack on BES and Embedded SMS4. [Citation Graph (, )][DBLP]
RFID Distance Bounding Protocol with Mixed Challenges to Prevent Relay Attacks. [Citation Graph (, )][DBLP]
Anonymizer-Enabled Security and Privacy for RFID. [Citation Graph (, )][DBLP]
Blink 'Em All: Scalable, User-Friendly and Secure Initialization of Wireless Sensor Nodes. [Citation Graph (, )][DBLP]
DepenDNS: Dependable Mechanism against DNS Cache Poisoning. [Citation Graph (, )][DBLP]
Privacy-Preserving Relationship Path Discovery in Social Networks. [Citation Graph (, )][DBLP]
Verifying Anonymous Credential Systems in Applied Pi Calculus. [Citation Graph (, )][DBLP]