Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Chainable Functional Commitments for Unbounded-Depth Circuits., , , and . TCC (3), volume 14371 of Lecture Notes in Computer Science, page 363-393. Springer, (2023)Subtractive Sets over Cyclotomic Rings - Limits of Schnorr-Like Arguments over Lattices., and . CRYPTO (2), volume 12826 of Lecture Notes in Computer Science, page 519-548. Springer, (2021)Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable - (Extended Abstract)., , , , and . CRYPTO (2), volume 13508 of Lecture Notes in Computer Science, page 102-132. Springer, (2022)Threshold Password-Hardened Encryption Services., , , , , and . CCS, page 409-424. ACM, (2020)Subvector Commitments with Application to Succinct Arguments., and . CRYPTO (1), volume 11692 of Lecture Notes in Computer Science, page 530-560. Springer, (2019)Multichannel Optimal Tree-Decodable Codes are Not Always Optimal Prefix Codes., , , and . ISIT, page 1-6. IEEE, (2022)Cryptography for Parallel RAM from Indistinguishability Obfuscation., , , , , and . ITCS, page 179-190. ACM, (2016)Incremental Proofs of Sequential Work., , and . EUROCRYPT (2), volume 11477 of Lecture Notes in Computer Science, page 292-323. Springer, (2019)Lattice-Based Timed Cryptography., and . IACR Cryptol. ePrint Arch., (2024)Forward-Secure Searchable Encryption on Labeled Bipartite Graphs., and . ACNS, volume 10355 of Lecture Notes in Computer Science, page 478-497. Springer, (2017)