Search
Add filters:
Use filters to refine the search results.
Item hits:
Publication Date | Article Title | Author(s) |
---|---|---|
2021 | Quantum Lightning Never Strikes the Same State Twice. Or: Quantum Money from Cryptographic Assumptions | Zhandry, Mark |
2020 | Proximity Preserving Binary Code Using Signed Graph-Cut | Lavi, Inbal; Avidan, Shai; Singer, Yoram; Hel-Or, Yacov |
2019 | SICO: Surgical Interception Attacks by Manipulating BGP Communities | Birge-Lee, Henry; Wang, Liang; Rexford, Jennifer; Mittal, Prateek |
2020 | Schrödinger’s Pirate: How to Trace a Quantum Decoder | Zhandry, Mark |
2020 | SQUARE: Strategic Quantum Ancilla Reuse for Modular Quantum Programs via Cost-Effective Uncomputation | Ding, Yongshan; Wu, Xin-Chuan; Holmes, Adam; Wiseth, Ash; Franklin, Diana, et al |
2015 | RAPTOR: Routing Attacks on Privacy in Tor | Sun, Yixin; Edmundson, Anne; Vanbever, Laurent; Li, Oscar; Rexford, Jennifer, et al |
2020 | Towards Non-interactive Witness Hiding | Kuykendall, Benjamin; Zhandry, Mark |
2021 | Securing internet applications from routing attacks | Sun, Yixin; Apostolaki, Maria; Birge-Lee, Henry; Vanbever, Laurent; Rexford, Jennifer, et al |
2021 | Revitalizing the public internet by making it extensible | Balakrishnan, Hari; Banerjee, Sujata; Cidon, Israel; Culler, David; Estrin, Deborah, et al |
2020 | Tracking P4 Program Execution in the Data Plane | Kodeswaran, Suriya; Arashloo, Mina T; Tammana, Praveen; Rexford, Jennifer |