Author of the publication

Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup.

, , , , and . Public Key Cryptography (1), volume 11442 of Lecture Notes in Computer Science, page 286-313. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Forcing Johnny to login safely., and . Journal of Computer Security, 21 (3): 393-424 (2013)The chatty-sensor: a provably-covert channel in cyber physical systems., and . ACSAC, page 638-649. ACM, (2019)Untraceable mobility or how to travel incognito., , , and . Comput. Networks, 31 (8): 871-884 (1999)Surf'N'Sign: Client Signatures on Web Documents., and . IBM Syst. J., 37 (1): 61-71 (1998)Safeguarding Digital Library Contents: Charging for Online Content.. D Lib Mag., (1998)Gossip Latin square and the meet-all gossipers problem., and . Inf. Process. Lett., 115 (10): 738-743 (2015)TCP Ack Storm DoS Attacks., and . SEC, volume 354 of IFIP Advances in Information and Communication Technology, page 29-40. Springer, (2011)Cryptographic Protocols to Prevent Spam.. IACR Cryptology ePrint Archive, (2005)Inter-FSP Funds Transfer Protocol., and . IACR Cryptology ePrint Archive, (2013)Folklore, Practice and Theory of Robust Combiners.. IACR Cryptology ePrint Archive, (2002)