Skip to main content

Search

Reset

Add filters:

Use filters to refine the search results.


Item hits:
Publication DateArticle TitleAuthor(s)
2021Quantum Lightning Never Strikes the Same State Twice. Or: Quantum Money from Cryptographic AssumptionsZhandry, Mark
2020Proximity Preserving Binary Code Using Signed Graph-CutLavi, Inbal; Avidan, Shai; Singer, Yoram; Hel-Or, Yacov
2019SICO: Surgical Interception Attacks by Manipulating BGP CommunitiesBirge-Lee, Henry; Wang, Liang; Rexford, Jennifer; Mittal, Prateek
2020Schrödinger’s Pirate: How to Trace a Quantum DecoderZhandry, Mark
2020SQUARE: Strategic Quantum Ancilla Reuse for Modular Quantum Programs via Cost-Effective UncomputationDing, Yongshan; Wu, Xin-Chuan; Holmes, Adam; Wiseth, Ash; Franklin, Diana, et al
2015RAPTOR: Routing Attacks on Privacy in TorSun, Yixin; Edmundson, Anne; Vanbever, Laurent; Li, Oscar; Rexford, Jennifer, et al
2020Towards Non-interactive Witness HidingKuykendall, Benjamin; Zhandry, Mark
2021Securing internet applications from routing attacksSun, Yixin; Apostolaki, Maria; Birge-Lee, Henry; Vanbever, Laurent; Rexford, Jennifer, et al
2021Revitalizing the public internet by making it extensibleBalakrishnan, Hari; Banerjee, Sujata; Cidon, Israel; Culler, David; Estrin, Deborah, et al
2020Tracking P4 Program Execution in the Data PlaneKodeswaran, Suriya; Arashloo, Mina T; Tammana, Praveen; Rexford, Jennifer