Publications

Publications

Quantum security analysis of a lattice-based oblivious transfer protocol
Liu, Mo-meng; Krämer, Juliane; Hu, Yu-pu; Buchmann, Johannes
Frontiers of Information Technology & Electronic Engineering, p.1348-1369
[Journal Article]


DÏoT: A Crowdsourced Self-learning Approach for Detecting Compromised IoT Devices
Nguyen, Thien Duc; Marchal, Samuel; Miettinen, Markus; Dang, Minh Hoang; Asokan, N.; Sadeghi, Ahmad-Reza
CoRR
[Journal Article]


OmniShare: Encrypted Cloud Storage for the Multi-Device Era
Asokan, N.; Gröndahl, Tommi; Nguyen, Hoang Long; Nguyen, Thien Duc; Paverd, Andrew; Pendyala, Praveen; Sadeghi, Ahmad-Reza; Stobert, Elizabeth; Tamrakar, Sandeep
IEEE Internet Computing, p.1-1
[Journal Article]


On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks
Lemos, Marcilio O. O.; Dantas, Yuri Gil; Fonseca, Iguatemi E.; Nigam, Vivek
Journal of Logical and Algebraic Methods in Programming, p.45-67
[Journal Article]


On the Accuracy of Formal Verification of Selective Defenses for TDoS Attacks
Lemos, Marcilio O. O.; Dantas, Yuri Gil; Fonseca, Iguatemi E.; Nigam, Vivek
Proceedings of the Journal of Logical and Algebraic Methods in Programming (JLAMP), p.45-67
[Journal Article]


A Systematic Evaluation of API-Misuse Detectors
Amann, Sven; Nguyen, Hoan Anh; Nadi, Sarah; Nguyen, Tien; Mezini, Mira
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING
[Journal Article]


Scalable Private Set Intersection Based on OT Extension
Pinkas, Benny; Schneider, Thomas; Zohner, Michael
ACM Transactions on Privacy and Security (TOPS), p.7:1-7:35
[Journal Article]


Trapped-ion quantum simulation of excitation transport: Disordered, noisy, and long-range connected quantum networks
Trautmann, N.; Hauke, P.
Physical Review A
[Journal Article]


PIR-PSI: Scaling Private Contact Discovery
Demmler, Daniel; Rindal, Peter; Rosulek, Mike; Trieu, Ni
Proceedings on Privacy Enhancing Technologies (PoPETs), p.159-178
[Journal Article]


Estimation of the Hardness of the Learning with Errors Problem with a Restricted Number of Samples
Bindel, Nina; Buchmann, Johannes; Göpfert, Florian; Schmidt, Markus
Journal of Mathematical Cryptology
[Journal Article]


An Overview of DRAM-Based Security Primitives
Anagnostopoulos, Nikolaos Athanasios; Katzenbeisser, Stefan; Chandy, John A.; Tehranipoor, Fatemeh
Cryptography
[Journal Article]


Decay-Based DRAM PUFs in Commodity Devices
Schaller, André; Xiong, Wenjie; Anagnostopoulos, Nikolaos Athanasios; Saleem, Umair; Gabmeyer, Sebastian; Skoric, Boris; Katzenbeisser, Stefan; Szefer, Jakub
IEEE Transactions on Dependable and Secure Computing (TDSC)
[Journal Article]


Intrinsic Run-Time Row Hammer PUFs: Leveraging the Row Hammer Effect for Run-Time Cryptography and Improved Security
Anagnostopoulos, Nikolaos Athanasios; Arul, Tolga; Fan, Yufan; Hatzfeld, Christian; Schaller, André; Xiong, Wenjie; Jain, Manishkumar; Saleem, Umair; Lotichius, Jan; Gabmeyer, Sebastian; Szefer, Jakub; Katzenbeisser, Stefan
Cryptography
[Journal Article]