If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Chapter
2003

Attacking an obfuscated cipher by injecting faults

Jacob, M., Boneh, D. & Felten, E., Jan 1 2003, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Feigenbaum, J. (ed.). Springer Verlag, Vol. 2696. p. 16-31 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2696).

Princeton University

Research output: Chapter in Book/Report/Conference proceedingChapter

37 Scopus citations
2000

Efficient commerce protocols based on one-time pads

Schneider, M. A. & Felten, E. W., Jan 1 2000, Proceedings - Annual Computer Security Applications Conference, ACSAC. p. 317-326 10 p. 898886

Princeton University

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Scopus citations