Author of the publication

Witness-Based Cryptographic Program Checking and Robust Function Sharing.

, , and . STOC, page 499-508. ACM, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sharing Block Ciphers., , and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 457-470. Springer, (2000)On Characterization of Escrow Encryption Schemes., and . ICALP, volume 1256 of Lecture Notes in Computer Science, page 705-715. Springer, (1997)"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash., , and . ASIACRYPT, volume 1163 of Lecture Notes in Computer Science, page 286-300. Springer, (1996)Adaptively-Secure Optimal-Resilience Proactive RSA., , and . ASIACRYPT, volume 1716 of Lecture Notes in Computer Science, page 180-194. Springer, (1999)Cryptanalysis of the Immunized LL Public Key Systems., and . CRYPTO, volume 963 of Lecture Notes in Computer Science, page 287-296. Springer, (1995)Shared Generation of Authenticators and Signatures (Extended Abstract)., and . CRYPTO, volume 576 of Lecture Notes in Computer Science, page 457-469. Springer, (1991)"Psyeudorandom Intermixing": A Tool for Shared Cryptography., , and . Public Key Cryptography, volume 1751 of Lecture Notes in Computer Science, page 306-325. Springer, (2000)How to share a function securely., , , and . STOC, page 522-533. ACM, (1994)Efficient Key Distribution for Slow Computing Devices: Achieving Fast Over the Air Activation for Wireless Systems., , and . S&P, page 66-76. IEEE Computer Society, (1998)A Practical Protocol for Large Group Oriented Networks.. EUROCRYPT, volume 434 of Lecture Notes in Computer Science, page 56-61. Springer, (1989)