A Formal Security Analysis of the Signal Messaging Protocol

Finger Printing Data

How to Subvert Backdoored Encryption

DeepMarks: A Digital Fingerprinting Framework for Deep Neural Networks

Measuring elliptic curve implementations in the wild

LC4: A Low-Tech Authenticated Cipher for Human-To-Human Communication

VeritasDB: High Throughput Key-Value Store with Integrity

Drive-by Key-Extraction Cache Attacks from Portable Code

How to Reveal the Secrets of an Obscure White-Box Implementation

A Cryptographic Analysis of the WireGuard Protocol