Information technology security assessment system SW Boyer, N Venna, M Ando US Patent 10,805,331, 2020 | 145 | 2020 |
Information technology security assessment system S Boyer, N Venna, M Ando US Patent 9,973,524, 2018 | 32 | 2018 |
Secret key generation M Ando US Patent 9,319,877, 2016 | 25 | 2016 |
Hash-based TPM signatures for the quantum world M Ando, JD Guttman, AR Papaleo, J Scire Applied Cryptography and Network Security: 14th International Conference …, 2016 | 16 | 2016 |
Practical and provably secure onion routing M Ando, A Lysyanskaya, E Upfal arXiv preprint arXiv:1706.05367, 2017 | 14 | 2017 |
On the complexity of anonymous communication through public networks M Ando, A Lysyanskaya, E Upfal arXiv preprint arXiv:1902.06306, 2019 | 10 | 2019 |
Cryptographic shallots: A formal treatment of repliable onion encryption M Ando, A Lysyanskaya Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021 | 8 | 2021 |
On the cost of suppressing volume for encrypted multi-maps M Ando, M George Proceedings on Privacy Enhancing Technologies, 2022 | 4 | 2022 |
Poly onions: Achieving anonymity in the presence of churn M Ando, M Christ, A Lysyanskaya, T Malkin Theory of Cryptography Conference, 715-746, 2022 | 2 | 2022 |
The use of a logistic map for key generation M Ando Massachusetts Institute of Technology, 2010 | 2 | 2010 |
Composable Bounds on Information Flow from Distribution Differences M Ando, JD Guttman Data Privacy Management, and Security Assurance: 10th International Workshop …, 2016 | 1 | 2016 |
Information technology security assessment system SW Boyer, N Venna, M Ando US Patent 12,010,137, 2024 | | 2024 |
Information technology security assessment system SW Boyer, N Venna, M Ando US Patent 11,882,146, 2024 | | 2024 |
Bruisable Onions: Anonymous Communication in the Asynchronous Model M Ando, A Lysyanskaya, E Upfal Cryptology ePrint Archive, 2024 | | 2024 |
Information technology security assessment system SW Boyer, N Venna, M Ando US Patent 11,777,976, 2023 | | 2023 |
Minimizing operational cost for zero information leakage M Ando, E Upfal 2017 IEEE International Conference on Communications (ICC), 1-7, 2017 | | 2017 |
From Chaos to Secret Key Agreement M Ando 2011 IEEE International Conference on Communications (ICC), 1-5, 2011 | | 2011 |
Estimating Normal Vectors of Polyhedral Surfaces M Ando | | |