Folgen
Philipp Jovanovic
Philipp Jovanovic
University College London
Bestätigte E-Mail-Adresse bei jovanovic.io - Startseite
Titel
Zitiert von
Zitiert von
Jahr
OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding
E Kokoris-Kogias, P Jovanovic, L Gasser, N Gailly, E Syta, B Ford
39th IEEE Symposium on Security and Privacy – IEEE S&P 2018, 2018
8582018
Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing
E Kokoris-Kogias, P Jovanovic, N Gailly, I Khoffi, L Gasser, B Ford
USENIX Security'16, 2016
748*2016
Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning
E Syta, I Tamas, D Visher, DI Wolinsky, P Jovanovic, L Gasser, N Gailly, ...
37th IEEE Symposium on Security and Privacy – IEEE S&P 2016, 2016
2802016
Scalable Bias-Resistant Distributed Randomness
E Syta, P Jovanovic, EK Kogias, N Gailly, L Gasser, I Khoffi, MJ Fischer, ...
38th IEEE Symposium on Security and Privacy – IEEE S&P 2017, 2017
2792017
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds
K Nikitin, E Kokoris Kogias, P Jovanovic, L Gasser, N Gailly, I Khoffi, ...
Proceedings of the 26th Usenix Security Symposium, 2017
1322017
Beyond 2^{c/2} Security in Sponge-Based Authenticated Encryption Modes
P Jovanovic, A Luykx, B Mennink
Advances in Cryptology – ASIACRYPT 2014, 85-104, 2014
1032014
NORX: Parallel and Scalable AEAD
JP Aumasson, P Jovanovic, S Neves
European Symposium on Research in Computer Security – ESORICS 2014, 19-36, 2014
87*2014
Calypso: Private data management for decentralized ledgers
E Kokoris-Kogias, EC Alp, L Gasser, P Jovanovic, E Syta, B Ford
Cryptology ePrint Archive, 2018
84*2018
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
H Böck, A Zauner, S Devlin, J Somorovsky, P Jovanovic
Workshop on Offensive Technologies – WOOT 2016, 2016
822016
Parametric Trojans for Fault-Injection Attacks on Cryptographic Hardware
R Kumar, P Jovanovic, WP Burleson, I Polian
Fault Diagnosis and Tolerance in Cryptography – FDTC 2014, 783, 2014
802014
Proof-of-personhood: Redemocratizing permissionless cryptocurrencies
M Borge, E Kokoris-Kogias, P Jovanovic, L Gasser, N Gailly, B Ford
2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 23-26, 2017
792017
A Fault Attack on the LED Block Cipher
P Jovanovic, M Kreuzer, I Polian
Constructive Side-Channel Analysis and Secure Design – COSADE 2012, 120-134, 2012
792012
Improved Masking for Tweakable Blockciphers with Applications to Authenticated Encryption
R Granger, P Jovanovic, B Mennink, S Neves
Advances in Cryptology – EUROCRYPT 2016, 263-293, 2016
732016
Analysis of NORX: Investigating Differential and Rotational Properties
JP Aumasson, P Jovanovic, S Neves
Progress in Cryptology – LATINCRYPT 2014, 306-324, 2014
49*2014
Dumb Crypto in Smart Grids: Practical Cryptanalysis of the Open Smart Grid Protocol
P Jovanovic, S Neves
IACR Cryptology ePrint Archive 2015, 428, 2015
45*2015
An Algebraic Fault Attack on the LED Block Cipher
P Jovanovic, M Kreuzer, I Polian
IACR Cryptology ePrint Archive, 2012/400, 2012
402012
Managing Identities Using Blockchains and CoSi
E Kokoris-Kogias, L Gasser, I Khoffi, P Jovanovic, N Gailly, B Ford
392016
Algebraic Attacks Using SAT-Solvers
P Jovanovic, M Kreuzer
Groups–Complexity–Cryptology 2 (2), 247-259, 2010
392010
Reaching consensus for asynchronous distributed key generation
I Abraham, P Jovanovic, M Maller, S Meiklejohn, G Stern, A Tomescu
Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing …, 2021
372021
NORX8 and NORX16: Authenticated Encryption for Low-End Systems
JP Aumasson, P Jovanovic, S Neves
Trustworthy Manufacturing and Utilization of Secure Devices – TRUDEVICE 2015, 2015
252015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20