Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reusable low-error compressive sampling schemes through privacy., , , , and . SSP, page 536-539. IEEE, (2012)Local List Recovery of High-rate Tensor Codes and Applications., , and . CoRR, (2017)Non-committing Encryption from Φ-hiding., , and . TCC (1), volume 9014 of Lecture Notes in Computer Science, page 591-608. Springer, (2015)MetaDORAM: Breaking the Log-Overhead Information Theoretic Barrier., , and . Electron. Colloquium Comput. Complex., (2024)DORAM Revisited: Maliciously Secure RAM-MPC with Logarithmic Overhead., , , , and . TCC (1), volume 14369 of Lecture Notes in Computer Science, page 441-470. Springer, (2023)SoK: General Purpose Compilers for Secure Multi-Party Computation., , , and . IEEE Symposium on Security and Privacy, page 1220-1237. IEEE, (2019)Recovering simple signals., , , , and . ITA, page 382-391. IEEE, (2012)Linear-Time List Recovery of High-Rate Expander Codes., and . ICALP (1), volume 9134 of Lecture Notes in Computer Science, page 701-712. Springer, (2015)Cryptographic Applications of Capacity Theory: On the Optimality of Coppersmith's Method for Univariate Polynomials., , , and . ASIACRYPT (1), volume 10031 of Lecture Notes in Computer Science, page 759-788. (2016)Local List Recovery of High-Rate Tensor Codes & Applications., , and . FOCS, page 204-215. IEEE Computer Society, (2017)