Thomas Yurek

According to our database1, Thomas Yurek authored at least 10 papers between 2018 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SGXonerate:Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE.
Proc. Priv. Enhancing Technol., January, 2024

SoK: SGX.Fail: How Stuff Gets eXposed.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
SGXonerated: Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE.
IACR Cryptol. ePrint Arch., 2023

Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
Practical Asynchronous Distributed Key Generation.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

hbACSS: How to Robustly Share Many Secrets.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

2019
HoneyBadgerMPC and AsynchroMix: Practical AsynchronousMPC and its Application to Anonymous Communication.
IACR Cryptol. ePrint Arch., 2019

Brief Note: Asynchronous Verifiable Secret Sharing with Optimal Resilience and Linear Amortized Overhead.
CoRR, 2019

HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Reactive redundancy for data destruction protection (R2D2).
Comput. Secur., 2018


  Loading...