Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Airdrop that Preserves Recipient Privacy., , , and . Financial Cryptography, volume 12059 of Lecture Notes in Computer Science, page 444-463. Springer, (2020)Zether: Towards Privacy in a Smart Contract World., , , and . Financial Cryptography, volume 12059 of Lecture Notes in Computer Science, page 423-443. Springer, (2020)On the Importance of Eliminating Errors in Cryptographic Computations., , and . J. Cryptol., 14 (2): 101-119 (2001)Protecting browsers from dns rebinding attacks., , , , and . ACM Conference on Computer and Communications Security, page 421-431. ACM, (2007)Blum-Blum-Shub Pseudorandom Bit Generator.. Encyclopedia of Cryptography and Security, Springer, (2005)Preventing Pollution Attacks in Multi-source Network Coding., , , and . Public Key Cryptography, volume 6056 of Lecture Notes in Computer Science, page 161-176. Springer, (2010)Aggregate and Verifiably Encrypted Signatures from Bilinear Maps., , , and . IACR Cryptology ePrint Archive, (2002)Flexible OS Support and Applications for Trusted Computing., , and . HotOS, page 145-150. USENIX, (2003)The Space of Transferable Adversarial Examples., , , , and . CoRR, (2017)Efficient generation of shared RSA keys., and . J. ACM, 48 (4): 702-722 (2001)