Author of the publication

Authenticated private information retrieval.

, , , , and . USENIX Security Symposium, page 3835-3851. USENIX Association, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Private Information Retrieval with Sublinear Online Time., and . EUROCRYPT (1), volume 12105 of Lecture Notes in Computer Science, page 44-75. Springer, (2020)FlashPatch: Spreading Software Updates over Flash Drives in Under-connected Regions., and . ACM DEV, page 1-10. ACM, (2014)The Discrete-Logarithm Problem with Preprocessing., and . EUROCRYPT (2), volume 10821 of Lecture Notes in Computer Science, page 415-447. Springer, (2018)The Discrete-Logarithm Problem with Preprocessing., and . IACR Cryptology ePrint Archive, (2017)The One-Wayness of Jacobi Signatures., and . IACR Cryptol. ePrint Arch., (2023)One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval., , , , and . USENIX Security Symposium, page 3889-3905. USENIX Association, (2023)Recommendations for Randomness in the Operating System, or How to Keep Evil Children out of Your Pool and Other Random Facts., and . HotOS, USENIX Association, (2015)FlashPatch: spreading software updates over flash drives in under-connected regions., and . ACM DEV (4), page 15:1-15:2. ACM, (2013)Quantum Operating Systems., , and . HotOS, page 76-81. ACM, (2017)Stickler: Defending Against Malicious CDNs in an Unmodified Browser., , and . CoRR, (2015)