Doreen Riepel
Doreen Riepel
Home
Publications
Service
Contact
CV
Light
Dark
Automatic
3
Public-Algorithm Substitution Attacks: Subverting Hashing and Verification
We study the possibility of algorithm substitution attacks (ASAs) on functions with no secret-key material, such as hash functions, and …
Mihir Bellare
,
Doreen Riepel
,
Laura Shea
PDF
Cite
Verifiable and Provably Secure Machine Unlearning
Machine unlearning aims to remove points from the training dataset of a machine learning model after training; for example when a user …
Thorsten Eisenhofer
,
Doreen Riepel
,
Varun Chandrasekaran
,
Esha Ghosh
,
Olga Ohrimenko
,
Nicolas Papernot
PDF
Cite
Cite
×