Thomas Shrimpton
Orcid: 0000-0001-8131-5634Affiliations:
- University of Lugano, Switzerland
According to our database1,
Thomas Shrimpton
authored at least 52 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on inf.unisi.ch
On csauthors.net:
Bibliography
2024
Leveraging Generative Models for Covert Messaging: Challenges and Tradeoffs for "Dead-Drop" Deployments.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
2023
IACR Cryptol. ePrint Arch., 2023
2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Covert Message Passing over Public Internet Platforms Using Model-Based Format-Transforming Encryption.
CoRR, 2021
Hear "No Evil", See "Kenansville"*: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Beyond L<sub>p</sub> Clipping: Equalization based Psychoacoustic Attacks against ASRs.
Proceedings of the Asian Conference on Machine Learning, 2021
2020
IACR Cryptol. ePrint Arch., 2020
2019
Security in the Presence of Key Reuse: Context-Separable Interfaces and their Applications.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Hear "No Evil", See "Kenansville": Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems.
CoRR, 2019
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Proceedings of the 26th USENIX Security Symposium, 2017
Standardizing Bad Cryptographic Practice: A Teardown of the IEEE Standard for Protecting Electronic-design Intellectual Property.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
IEEE Secur. Priv., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
2011
Careful with Composition: Limitations of Indifferentiability and Universal Composability.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
J. Cryptol., 2009
IACR Cryptol. ePrint Arch., 2009
2008
IACR Cryptol. ePrint Arch., 2008
2007
IEEE Trans. Mob. Comput., 2007
IACR Cryptol. ePrint Arch., 2007
2006
Deterministic Authenticated-Encryption: A Provable-Security Treatment of the Key-Wrap Problem.
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28, 2006
2004
A Characterization of Authenticated-Encryption as a Form of Chosen-Ciphertext Security.
IACR Cryptol. ePrint Arch., 2004
Cryptographic Hash-Function Basics: Definitions, Implications and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance.
IACR Cryptol. ePrint Arch., 2004
2002
IACR Cryptol. ePrint Arch., 2002
IACR Cryptol. ePrint Arch., 2002