1. Users are not the enemy;Adams;Commun. ACM,1999
2. On the security of RC4 in TLS;AlFardan,2013
3. Lucky thirteen: Breaking the TLS and DTLS record protocols;AlFardan,2013
4. Argon2: new generation of memory-hard functions for password hashing and other applications;Biryukov,2016
5. Differentially private integer partitions and their applications;Blocki;Theory and Practice of Differential Privacy,2016