Frontal Attack: Leaking Control-Flow in SGX via the CPU Frontend I Puddu, M Schneider, M Haller, S Čapkun 30th USENIX Security Symposium (USENIX Security 21), 663-680, 2021 | 44 | 2021 |
HECO: Automatic Code Optimizations for Efficient Fully Homomorphic Encryption A Viand, P Jattke, M Haller, A Hithnawi arXiv preprint arXiv:2202.01649, 2022 | 28* | 2022 |
MEGA: Malleable Encryption Goes Awry M Backendal, M Haller, KG Paterson 2023 IEEE Symposium on Security and Privacy (SP), 146-163, 2023 | 17 | 2023 |
Caveat Implementor! Key Recovery Attacks on MEGA MR Albrecht, M Haller, L Mareková, KG Paterson Advances in Cryptology–EUROCRYPT 2023: 42nd Annual International Conference …, 2023 | 8 | 2023 |
Cloud Storage Systems: From Bad Practice to Practical Attacks M Haller ETH Zurich, 2022 | 2 | 2022 |
Revisiting Microarchitectural Side-Channels M Haller | 1 | 2020 |
End-to-End Encrypted Cloud Storage M Backendal, M Haller, K Paterson IEEE Security & Privacy 22 (2), 69-74, 2024 | | 2024 |
An Empirical Analysis on the Use and Reporting of National Security Letters A Bellon, M Haller, A Labunets, E Liu, S Savage arXiv preprint arXiv:2403.02768, 2024 | | 2024 |
A Formal Treatment of End-to-End Encrypted Cloud Storage M Backendal, H Davis, F Günther, M Haller, KG Paterson Cryptology ePrint Archive, 2024 | | 2024 |
MFKDF: Multiple Factors Knocked Down Flat M Scarlata, M Backendal, M Haller Cryptology ePrint Archive, 2024 | | 2024 |