Ledger Language Design: Designing and Deploying Formally Verified Public Ledgers

A Formal Security Analysis of the Signal Messaging Protocol

Finger Printing Data

How to Subvert Backdoored Encryption

DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks

Measuring elliptic curve implementations in the wild

LC4: A Low-Tech Authenticated Cipher for Human-To-Human Communication

VeritasDB: High Throughput Key-Value Store with Integrity

Drive-by Key-Extraction Cache Attacks from Portable Code

How to Reveal the Secrets of an Obscure White-Box Implementation