Michael Hamburg

According to our database1, Michael Hamburg authored at least 23 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Tighter proofs of CCA security in the quantum random oracle model.
IACR Cryptology ePrint Archive, 2019

Quantum Security Proofs Using Semi-classical Oracles.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Spectre Attacks: Exploiting Speculative Execution.
meltdownattack.com, 2018

Meltdown
meltdownattack.com, 2018

Meltdown: Reading Kernel Memory from User Space.
Proceedings of the 27th USENIX Security Symposium, 2018

2017
Cryptanalysis of 22 1/2 rounds of Gimli.
IACR Cryptology ePrint Archive, 2017

The STROBE protocol framework.
IACR Cryptology ePrint Archive, 2017

A Side-Channel Assisted Cryptanalytic Attack Against QcBits.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

2016
Elliptic Curves for Security.
RFC, January, 2016

2015
Ed448-Goldilocks, a new elliptic curve.
IACR Cryptology ePrint Archive, 2015

Decaf: Eliminating Cofactors Through Point Compression.
Proceedings of the Advances in Cryptology - CRYPTO 2015, 2015

2014
Twisting Edwards curves with isogenies.
IACR Cryptology ePrint Archive, 2014

2013
Elligator: elliptic-curve points indistinguishable from uniform random strings.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Fast and compact elliptic-curve cryptography.
IACR Cryptology ePrint Archive, 2012

2011
Spatial Encryption.
IACR Cryptology ePrint Archive, 2011

OpenConflict: Preventing Real Time Map Hacks in Online Games.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Location Privacy via Private Proximity Testing.
Proceedings of the Network and Distributed System Security Symposium, 2011

2010
The Case for Ubiquitous Transport-Level Encryption.
Proceedings of the 19th USENIX Security Symposium, 2010

2009
Accelerating AES with Vector Permute Instructions.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2009

Symmetric Cryptography in Javascript.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Circular-Secure Encryption from Decision Diffie-Hellman.
Proceedings of the Advances in Cryptology, 2008

Generalized Identity Based and Broadcast Encryption Schemes.
Proceedings of the Advances in Cryptology, 2008

2007
Space-Efficient Identity Based Encryption Without Pairings.
Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), 2007


  Loading...