Author of the publication

Another Look at Anonymous Communication - Security and Modular Constructions.

, , , and . Mycrypt, volume 10311 of Lecture Notes in Computer Science, page 56-82. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lattice-Based Succinct Arguments from Vanishing Polynomials - (Extended Abstract)., , and . CRYPTO (2), volume 14082 of Lecture Notes in Computer Science, page 72-105. Springer, (2023)Trapdoors for Ideal Lattices with Applications., , and . Inscrypt, volume 8957 of Lecture Notes in Computer Science, page 239-256. Springer, (2014)Optimal Succinct Arguments via Hidden Order Groups., and . IACR Cryptology ePrint Archive, (2018)Foundations of Ring Sampling., , , , and . Proc. Priv. Enhancing Technol., 2021 (3): 265-288 (2021)Cryptography for Parallel RAM from Indistinguishability Obfuscation., , , , , and . ITCS, page 179-190. ACM, (2016)Chainable Functional Commitments for Unbounded-Depth Circuits., , , and . TCC (3), volume 14371 of Lecture Notes in Computer Science, page 363-393. Springer, (2023)Multichannel Optimal Tree-Decodable Codes are Not Always Optimal Prefix Codes., , , and . ISIT, page 1-6. IEEE, (2022)Subtractive Sets over Cyclotomic Rings - Limits of Schnorr-Like Arguments over Lattices., and . CRYPTO (2), volume 12826 of Lecture Notes in Computer Science, page 519-548. Springer, (2021)Lattice-Based SNARKs: Publicly Verifiable, Preprocessing, and Recursively Composable - (Extended Abstract)., , , , and . CRYPTO (2), volume 13508 of Lecture Notes in Computer Science, page 102-132. Springer, (2022)Incremental Proofs of Sequential Work., , and . EUROCRYPT (2), volume 11477 of Lecture Notes in Computer Science, page 292-323. Springer, (2019)