Most Cited Security Papers from 2015–2019

  • Machine Learning Security & Privacy
  • Architecture & Side-Channel Attacks
  • Cryptocurrencies & Blockchains
  • Real World Attacks & Case Studies
  • Cryptography

--

--

--

Working in security and cryptography. Opinions are entirely my own.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Send Tokens to any Telegram Contact with just 1-Click — New Wallet Features coming soon.

PUNDI X-FORCE BLOG SERIES: Part 2— Function X Testnet

How to use Koala Defi on Polygon chain

Sacramentum Chamber Of Secrets Flag2 ctf writeup

Latex Mattresses The Ultimate Callcomfortably https://t.co/dsaedkscPQ

Testing “By The Way” on Mikrotik Router

{UPDATE} Vampir Geheimnisse 2 Liebe Hack Free Resources Generator

Merlin — $200,000 USDT Bounty Reward Program

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Steve Weis

Steve Weis

Working in security and cryptography. Opinions are entirely my own.

More from Medium

“CloudSquatting”: Taking Over Abandoned Cloud Storage Locations

Russian Cyberattacks Are On The Rise: Here is How You Can Help Keep Your Data Secure

Security and Privacy at the Edge of Internet of Things

Should we save security till the end?