Author of the publication

Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup.

, , , , and . Public Key Cryptography (1), volume 11442 of Lecture Notes in Computer Science, page 286-313. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

ARTist: The Android Runtime Instrumentation and Security Toolkit., , , , and . EuroS&P, page 481-495. IEEE, (2017)Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup., , , , and . Public Key Cryptography (1), volume 11442 of Lecture Notes in Computer Science, page 286-313. Springer, (2019)Your Choice MATor(s): Large-scale Quantitative Anonymity Assessment of Tor Path Selection Algorithms Against Structural Attacks., , and . Proc. Priv. Enhancing Technol., 2016 (2): 40-60 (2016)Proconda - Protected Control Data., , , and . CoRR, (2019)Fairwalk: Towards Fair Graph Embedding, , , and . Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, page 3289--3295. Macao, China, International Joint Conferences on Artificial Intelligence Organization, (August 2019)Revisiting Transferable Adversarial Image Examples: Attack Categorization, Evaluation Guidelines, and New Insights., , , , , , , and . CoRR, (2023)You Are How You Walk: Quantifying Privacy Risks in Step Count Data., , , , and . CoRR, (2023)FAKEPCD: Fake Point Cloud Detection via Source Attribution., , , , and . CoRR, (2023)Mondrian: Prompt Abstraction Attack Against Large Language Models for Cheaper API Pricing., , and . CoRR, (2023)UnGANable: Defending Against GAN-based Face Manipulation., , , , , and . CoRR, (2022)