Cited By
View all- Romanelli MChatzikokolakis KPalamidessi CPiantanida PLigatti JOu XKatz JVigna G(2020)Estimating g-Leakage via Machine LearningProceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security10.1145/3372297.3423363(697-716)Online publication date: 30-Oct-2020
- Watt CRenner JPopescu NCauligi SStefan D(2019)CT-wasm: type-driven secure cryptography for the web ecosystemProceedings of the ACM on Programming Languages10.1145/32903903:POPL(1-29)Online publication date: 2-Jan-2019
- Boreale MCorradi F(2018)Searching secrets rationallyInternational Journal of Approximate Reasoning10.1016/j.ijar.2015.11.01069:C(133-146)Online publication date: 29-Dec-2018
- Show More Cited By