Follow
Megumi Ando
Megumi Ando
Verified email at tufts.edu
Title
Cited by
Cited by
Year
Information technology security assessment system
SW Boyer, N Venna, M Ando
US Patent 10,805,331, 2020
1402020
Information technology security assessment system
S Boyer, N Venna, M Ando
US Patent 9,973,524, 2018
282018
Secret key generation
M Ando
US Patent 9,319,877, 2016
252016
Hash-based TPM signatures for the quantum world
M Ando, JD Guttman, AR Papaleo, J Scire
Applied Cryptography and Network Security: 14th International Conference …, 2016
162016
Practical and provably secure onion routing
M Ando, A Lysyanskaya, E Upfal
arXiv preprint arXiv:1706.05367, 2017
132017
On the complexity of anonymous communication through public networks
M Ando, A Lysyanskaya, E Upfal
arXiv preprint arXiv:1902.06306, 2019
92019
Cryptographic shallots: A formal treatment of repliable onion encryption
M Ando, A Lysyanskaya
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021
72021
On the cost of suppressing volume for encrypted multi-maps
M Ando, M George
Proceedings on Privacy Enhancing Technologies, 2022
32022
The use of a logistic map for key generation
M Ando
Massachusetts Institute of Technology, 2010
22010
Poly Onions: Achieving Anonymity in the Presence of Churn
M Ando, M Christ, A Lysyanskaya, T Malkin
Theory of Cryptography Conference, 715-746, 2022
12022
Composable Bounds on Information Flow from Distribution Differences
M Ando, JD Guttman
Data Privacy Management, and Security Assurance: 10th International Workshop …, 2016
12016
Information technology security assessment system
SW Boyer, N Venna, M Ando
US Patent 11,882,146, 2024
2024
Information technology security assessment system
SW Boyer, N Venna, M Ando
US Patent App. 18/453,488, 2023
2023
Information technology security assessment system
SW Boyer, N Venna, M Ando
US Patent 11,777,976, 2023
2023
Minimizing operational cost for zero information leakage
M Ando, E Upfal
2017 IEEE International Conference on Communications (ICC), 1-7, 2017
2017
From Chaos to Secret Key Agreement
M Ando
2011 IEEE International Conference on Communications (ICC), 1-5, 2011
2011
Estimating Normal Vectors of Polyhedral Surfaces
M Ando
The system can't perform the operation now. Try again later.
Articles 1–17