Papers in cryptography
- Characterizing Two User Interfaces for Interaction with Spatial Objects
- Communication Theory of Secrecy Systems
- Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2
- New Directions in Cryptography
- NTRU Prime: Reducing Attack Surface at Low Cost
- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis
- The Moral Character of Cryptographic Work
- Twenty Years of Attacks on the RSA Cryptosystem