Author of the publication

Size-Hiding in Private Set Intersection: Existential Results and Constructions.

, , , and . AFRICACRYPT, volume 7374 of Lecture Notes in Computer Science, page 378-394. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Distribution of a Key Distribution Center.. ICTCS, volume 2202 of Lecture Notes in Computer Science, page 357-369. Springer, (2001)Secret sharing schemes for infinite sets of participants: A new design technique., , and . Theor. Comput. Sci., (2021)Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures., , , and . Theor. Comput. Sci., 320 (2-3): 269-291 (2004)Multi-stage Proof-of-Works: Properties and vulnerabilities., , and . Theor. Comput. Sci., (October 2023)Generalized Zig-zag Functions and Oblivious Transfer Reductions., and . Selected Areas in Cryptography, volume 2259 of Lecture Notes in Computer Science, page 87-102. Springer, (2001)Secret Disclosure Attacks on a Recent Ultralightweight Mutual RFID Authentication Protocol for Blockchain-Enabled Supply Chains., and . SoCPaR, volume 1383 of Advances in Intelligent Systems and Computing, page 880-890. Springer, (2020)New Results on Unconditionally Secure Distributed Oblivious Transfer., , , and . Selected Areas in Cryptography, volume 2595 of Lecture Notes in Computer Science, page 291-309. Springer, (2002)A New Instance of a Lightweight Authentication Protocol Based on the LPN Problem., and . I-SPAN, volume 1080 of Communications in Computer and Information Science, page 118-132. Springer, (2019)Hyppocrates., , , and . ISC, volume 2200 of Lecture Notes in Computer Science, page 63-80. Springer, (2001)Private Visual Share-Homomorphic Computation and Randomness Reduction in Visual Cryptography., , and . ICITS, volume 10015 of Lecture Notes in Computer Science, page 95-113. (2016)