From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Laconic Function Evaluation and Applications., , и . FOCS, стр. 859-870. IEEE Computer Society, (2018)Updatable Public Key Encryption in the Standard Model., , и . TCC (3), том 13044 из Lecture Notes in Computer Science, стр. 254-285. Springer, (2021)Multi-instance Randomness Extraction and Security Against Bounded-Storage Mass Surveillance., , и . TCC (3), том 14371 из Lecture Notes in Computer Science, стр. 93-122. Springer, (2023)Succinct LWE Sampling, Random Polynomials, and Obfuscation., , , , и . TCC (2), том 13043 из Lecture Notes in Computer Science, стр. 256-287. Springer, (2021)Candidate Obfuscation via Oblivious LWE Sampling., и . EUROCRYPT (3), том 12698 из Lecture Notes in Computer Science, стр. 127-156. Springer, (2021)Witness Encryption and Null-IO from Evasive LWE., , и . ASIACRYPT (1), том 13791 из Lecture Notes in Computer Science, стр. 195-221. Springer, (2022)Tamper Detection and Continuous Non-malleable Codes., и . TCC (1), том 9014 из Lecture Notes in Computer Science, стр. 451-480. Springer, (2015)Adaptively Secure MPC with Sublinear Communication Complexity., , и . CRYPTO (2), том 11693 из Lecture Notes in Computer Science, стр. 30-60. Springer, (2019)Fully Leakage-Resilient Signatures., , и . EUROCRYPT, том 6632 из Lecture Notes in Computer Science, стр. 89-108. Springer, (2011)Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key., , и . EUROCRYPT (2), том 9666 из Lecture Notes in Computer Science, стр. 388-419. Springer, (2016)