Public Accountability vs. Secret Laws: Can They Coexist?

Efficient Logistic Regression on Large Encrypted Data

Ramanujan graphs in cryptography

Ledger Language Design: Designing and Deploying Formally Verified Public Ledgers

A Formal Security Analysis of the Signal Messaging Protocol

Finger Printing Data

How to Subvert Backdoored Encryption

DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks

Measuring elliptic curve implementations in the wild

LC4: A Low-Tech Authenticated Cipher for Human-To-Human Communication