Follow
Ali Juma
Ali Juma
Google Inc.
Verified email at cs.toronto.edu
Title
Cited by
Cited by
Year
Protecting cryptographic keys against continual leakage
A Juma, Y Vahlis
Advances in Cryptology–CRYPTO 2010, 41-58, 2010
942010
The black-box query complexity of polynomial summation
A Juma, V Kabanets, C Rackoff, A Shpilka
Computational Complexity 18 (1), 59-79, 2009
132009
Limits on the stretch of non-adaptive constructions of pseudo-random generators
J Bronson, A Juma, PA Papakonstantinou
Proceedings of the 8th conference on Theory of cryptography, 504-521, 2011
92011
On protecting cryptographic keys against side-channel attacks
A Juma, Y Vahlis
Advances in Cryptology–CRYPTO’10, 41-58, 2010
72010
Multi-location leakage resilient cryptography
A Juma, Y Vahlis, M Yung
International Workshop on Public Key Cryptography, 504-521, 2012
32012
Leakage resilience and black-box impossibility results in cryptography
A Juma
University of Toronto, 2011
2011
Some Results in Computational Complexity
A Juma
University of Toronto, 2005
2005
The system can't perform the operation now. Try again later.
Articles 1–7